Report #8703 check_circle

  • Creation Date: March 5, 2020, 2:01 p.m.
  • Last Update: March 5, 2020, 8:40 p.m.
  • File: Detran_multa879.exe
  • Results:
Binary
DLL
False cancel
Size
556.29KB
trid
35.5% Win32 Executable Delphi generic
32.8% Windows screen saver
11.2% Win32 Executable
5.1% Win16/32 Executable Delphi generic
5.0% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
bc8033debfaf7f3ee085b3453c830aab
sha1
2d8b2fc1828c6e10cbfac12881cc28e157918729
crc32
0xe3fc5cb2
sha224
c87b8a07a8a5bd8e7e392173e370ad6aac9b7e6179eae7d3d49342f7
sha256
6104878dbfaa1c8bdc3fe0c1d1d186a3dbed94b8da71ebe0357f5bfdd32bb958
sha384
7a053041bf474ae680079b5b7f268bda1f8c98e1a8a34caa9da7b51423f45de7ad504557d72fc3104796604f111cd201
sha512
04f95cd6e77a4776cf7314358f66aa0f0b9e76841327dded0f50af2e05beb6cd53b8b015e825a454bf97862af62125f7bbdfc5c4bfd3dc35cbccd344c362f02e
ssdeep
12288:IbkIM9Epe5wlQaQmyHRODERt1ZL/zvwX7m:IBNpjlQJogt15rvWS
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, network_dropper, Delphi_DecodeDate, borland_delphi, Delphi_FormShow, Delphi_CompareCall, Microsoft_Visual_Cpp_v50v60_MFC, win_files_operation, IsPE32, win_hook, contentis_base64, screenshot, Borland_Delphi_v40_v50, keylogger, win_mutex, Borland_Delphi_40_additional, Borland_Delphi_40, IsWindowsGUI, Borland_Delphi_Setup_Module, Delphi_Copy, HasDigitalSignature, Borland_Delphi_DLL, url, win_registry, HasOverlay, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
http://www.kids4mo.com/wp-content/uploads/2015/08/WinPlugin.exe
?http://www.kids4mo.com/wp-content/uploads/2015/08/WinPlugin.exe
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
4http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
5http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
2http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
2http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
.http://www.digicert.com/ssl-cps-repository.htm0
https://www.digicert.com/CPS0
carlosant30@hotmail.com
carlosant30@hotmail.com
t.Ht
Font.Name
Font.Style
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
\AppData\Roaming\WinPlugin.exe
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" publicKeyToken="6595b64144ccf1df" language="*" processorArchitecture="*"/>
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
<assemblyIdentity type="win32" name="PluginSeg.exe" version="3.1.0.0" processorArchitecture="*"/>
WinPlugin.exe
http://ocsp.digicert.com0A
http://ocsp.digicert.com0C
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
winspool.drv
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
vcltest3.dll
uxtheme.dll
1.0.0.0
1.0.0.0
Uh_1A
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
JumpID("","%s")
Sub-menu is not in menu
Division by zero
UhfDA
Selected
TaskbarCreated
Rebuild
bsSizeToolWin
August September
ToolWin
device
Too many open files
Assertion failed
DigiCert Assured ID Root CA0
%s (%s, line %d)
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Privileged instruction(Exception %s in module %s at %p.
Error reading %s%s%s: %s
I/O error %d
List count out of bounds (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Class %s not found
Property %s does not exist
\AppData\Roaming\
Resource %s not found
C:\Users\
C:\Users\
OnDestroy
ESafecallException
OnHide
*ShellAPI
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
ming\WinPlugin
WinPlugin\
<requestedPrivileges>
PasswordChar$
ssShift
ssHotTrack
Error creating window class+Cannot focus a disabled or invisible window!Control '%s' has no parent window
Invalid stream format$''%s'' is not a valid component name
ssHorizontal
ssLeft
No argument for format '%s'"Variant method calls not supported
Delphi Component
Invalid variant operation%Invalid variant operation (%s%.8x)
TPersistent
TPersistent
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Application Error1Format '%s' invalid or incompatible with argument
GetProcAddress
GetProcAddress
TInterfacedObject
System Error. Code: %d.
EPrivilege
Invalid class typecast0Access violation at address %p. %s of address %p

Foremost
Matches
0.exe, 550 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://crl3.digicert.com/digicertassuredidrootca.crl0:, http://ocsp.digicert.com0c, http://ocsp.digicert.com0a, http://crl4.digicert.com/digicertassuredidrootca.crl0, http://www.kids4mo.com/wp-content/uploads/2015/08/winplugin.exe, http://cacerts.digicert.com/digicertassuredidca-1.crt0, http://crl4.digicert.com/digicertassuredidca-1.crl0w, http://cacerts.digicert.com/digicertassuredidrootca.crt0, https://www.digicert.com/cps0, http://www.digicert.com/ssl-cps-repository.htm0, http://crl3.digicert.com/digicertassuredidca-1.crl08
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, URLMON.DLL, kernel32.dll, uxtheme.dll, RICHED32.DLL, gdi32.dll, vcltest3.dll, MAPI32.DLL, version.dll, comctl32.dll, shell32.dll, imm32.dll, advapi32.dll, oleaut32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 224256
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 584112
Suspicous: False cancel

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 342176
Suspicious: False cancel

Anomalies
Anomalies
hasAnomalies: False cancel

Libraries
Allowed: user32.dll, urlmon.dll, kernel32.dll, uxtheme.dll, riched32.dll, gdi32.dll, mapi32.dll, version.dll, comctl32.dll, shell32.dll, imm32.dll, advapi32.dll, oleaut32.dll
hasLibs: True check_circle
Suspicious: vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 65
.rsrc: 40

pushpopmath
none: 5
.rsrc: 4
.reloc: 27

garbagebytes
none: 65
.rsrc: 5

hookdetection
none: 2
.reloc: 2

software breakpoint
.reloc: 10

programcontrolflowchange
none: 65
.rsrc: 5

cpuinstructionsresultscomparison
none: 11
.rsrc: 14

AVclass
banload
1
VirusTotal
md5
bc8033debfaf7f3ee085b3453c830aab
sha1
2d8b2fc1828c6e10cbfac12881cc28e157918729
SCANS (DETECTION RATE = 62.69%)
AVG
result: Win32:Banker-MQT [Trj]
update: 20180831
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180831
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180831
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180831
version: 1.3.0.8876
detected: False cancel

K7GW
result: Spyware ( 004b0ae81 )
update: 20180831
version: 10.61.28251
detected: True check_circle

ALYac
result: Trojan.Downloader.JSNC
update: 20180831
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-MQT [Trj]
update: 20180831
version: 18.4.3895.0
detected: True check_circle

Avira
result: HEUR/AGEN.1033134
update: 20180831
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180830
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.MCHC-0779
update: 20180831
version: 6.0.0.4
detected: True check_circle

DrWeb
result: Trojan.DownLoader18.10399
update: 20180831
version: 7.0.33.6080
detected: True check_circle

GData
result: Trojan.Downloader.JSNC
update: 20180831
version: A:25.18304B:25.13100
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180831
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20180831
version: 3.33.0
detected: False cancel

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180831
version: 69230
detected: True check_circle

Zoner
update: 20180830
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180823
version: 1.6.0.52
detected: True check_circle

ClamAV
update: 20180831
version: 0.100.1.0
detected: False cancel

Comodo
update: 20180831
detected: False cancel

F-Prot
update: 20180831
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan.Downloader
update: 20180831
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericR-FJV!BC8033DEBFAF
update: 20180831
version: 6.0.6.653
detected: True check_circle

Rising
result: Trojan.Win32.Generic.19928B24 (C64:YzY0Oh1xc1GZG1m3)
update: 20180831
version: 25.0.0.24
detected: True check_circle

Sophos
result: Troj/Banloa-CJG
update: 20180831
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!tu2ZVVXXFps
update: 20180831
version: 5.5.1.3
detected: True check_circle

Zillya
result: Trojan.Banload.Win32.172
update: 20180831
version: 2.0.0.3629
detected: True check_circle

Arcabit
result: Trojan.Downloader.JSNC
update: 20180831
version: 1.0.0.833
detected: True check_circle

Babable
update: 20180822
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20180831
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180730
version: 3.0.1
detected: True check_circle

TACHYON
update: 20180831
version: 2018-08-31.03
detected: False cancel

Tencent
update: 20180831
version: 1.0.0.1
detected: False cancel

ViRobot
update: 20180831
version: 2014.3.20.0
detected: False cancel

Webroot
result: W32.Trojan.Downloader.JSNC
update: 20180831
version: 1.0.0.403
detected: True check_circle

eGambit
update: 20180831
detected: False cancel

Ad-Aware
result: Trojan.Downloader.JSNC
update: 20180831
version: 3.0.5.370
detected: True check_circle

AegisLab
update: 20180831
version: 4.2
detected: False cancel

Emsisoft
result: Trojan.Downloader.JSNC (B)
update: 20180831
version: 2018.4.0.1029
detected: True check_circle

F-Secure
result: Trojan.Downloader.JSNC
update: 20180831
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.WUB!tr
update: 20180831
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180717
version: 6.3.5.26121
detected: False cancel

Jiangmin
result: TrojanDownloader.Generic.apyd
update: 20180831
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180831
version: 2013.8.14.323
detected: False cancel

Symantec
result: Trojan Horse
update: 20180831
version: 1.7.0.0
detected: True check_circle

AhnLab-V3
result: Malware/Win32.Generic.C1322613
update: 20180831
version: 3.13.1.21616
detected: True check_circle

Antiy-AVL
update: 20180831
version: 3.0.0.1
detected: False cancel

Kaspersky
result: HEUR:Trojan-Downloader.Win32.Generic
update: 20180831
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Dynamer!ac
update: 20180831
version: 1.1.15200.1
detected: True check_circle

Qihoo-360
result: Win32/Trojan.cb4
update: 20180831
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180829
version: 6.8.0.5.3634
detected: False cancel

ZoneAlarm
result: UDS:DangerousObject.Multi.Generic
update: 20180831
version: 1.0
detected: True check_circle

Cybereason
result: malicious.ebfaf7
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: Win32/TrojanDownloader.Banload.WVE
update: 20180831
version: 17974
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0OBG18
update: 20180831
version: 10.0.0.1040
detected: True check_circle

BitDefender
result: Trojan.Downloader.JSNC
update: 20180831
version: 7.2
detected: True check_circle

CrowdStrike
update: 20180723
version: 1.0
detected: False cancel

K7AntiVirus
result: Spyware ( 004b0ae81 )
update: 20180831
version: 10.61.28254
detected: True check_circle

SentinelOne
update: 20180830
version: 1.0.19.234
detected: False cancel

Avast-Mobile
update: 20180831
version: 180830-04
detected: False cancel

Malwarebytes
update: 20180831
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180831
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
update: 20180831
version: 14.00
detected: False cancel

NANO-Antivirus
result: Trojan.Win32.Dwn.dzfqmc
update: 20180831
version: 1.0.126.23745
detected: True check_circle

MicroWorld-eScan
result: Trojan.Downloader.JSNC
update: 20180831
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180831
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: GenericR-FJV!BC8033DEBFAF
update: 20180831
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0OBG18
update: 20180831
version: 9.950.0.1006
detected: True check_circle

total
67
sha256
6104878dbfaa1c8bdc3fe0c1d1d186a3dbed94b8da71ebe0357f5bfdd32bb958
scan_id
6104878dbfaa1c8bdc3fe0c1d1d186a3dbed94b8da71ebe0357f5bfdd32bb958-1535728578
resource
bc8033debfaf7f3ee085b3453c830aab
positives
42
scan_date
2018-08-31 15:16:18
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
5/3/2020 - 19:45:44.590Open2308C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 19:45:44.590Open2308C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 19:45:44.590Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 19:45:44.590Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 19:45:44.590Open2308C:\malware.exeC:\DNSAPI.dll
5/3/2020 - 19:45:44.590Open2308C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 19:45:44.590Open2308C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 19:45:44.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 19:45:44.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 19:45:44.809Open2308C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 19:45:44.809Open2308C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 19:45:44.809Open2308C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 19:45:44.809Open2308C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 19:45:44.856Open2308C:\malware.exeC:\dhcpcsvc6.DLL
5/3/2020 - 19:45:44.856Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 19:45:44.856Unknown2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 19:45:44.856Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 19:45:44.856Unknown2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\CRYPTSP.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\RpcRtRemote.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 19:45:44.903Unknown2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 19:45:44.903Unknown2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\dhcpcsvc.DLL
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 19:45:44.903Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 19:45:44.981Open2308C:\malware.exeC:\rasadhlp.dll
5/3/2020 - 19:45:44.981Open2308C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 19:45:44.981Open2308C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 19:45:45.28Open2308C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 19:45:45.28Open2308C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 19:45:45.575Open2308C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
5/3/2020 - 19:45:45.575Open2308C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\malware.exe.Local
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 19:45:45.622Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:45.622Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 19:45:46.137Open2308C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 19:45:46.137Open2308C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Windows
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Monitor
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88\comctl32.dll.muicomctl32.dll.mui
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
5/3/2020 - 19:45:47.700Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
5/3/2020 - 19:45:44.590Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
5/3/2020 - 19:45:44.590Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
5/3/2020 - 19:45:44.590Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
5/3/2020 - 19:45:44.590Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
5/3/2020 - 19:45:44.590Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
5/3/2020 - 19:45:44.590Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
5/3/2020 - 19:45:44.668Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
5/3/2020 - 19:45:44.668Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
5/3/2020 - 19:45:44.668Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
5/3/2020 - 19:45:45.75Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 19:45:45.75Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 19:45:45.75Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 19:45:45.75Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
5/3/2020 - 19:45:46.387Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 19:45:46.387Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 19:45:46.387Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 19:45:46.387Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code www.kids4mo.com.
computer localhost arrow_forward computer gateway:50273 code www.kids4mo.com.
computer localhost arrow_forward computer gateway:DNS code kids4mo.com.

Response
computer gateway:DNS arrow_forward computer localhost code kids4mo.com. reply_all 97.74.183.1

computer gateway:DNS arrow_forward computer localhost code www.kids4mo.com. reply_all 97.74.183.1


TCP
Info
computer localhost:65191 arrow_forward 97.74.183.1:80
97.74.183.1:80 arrow_forward computer localhost:65192
computer localhost:65192 arrow_forward 97.74.183.1:80
97.74.183.1:80 arrow_forward computer localhost:65191

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info
computer localhost send GET www.kids4mo.com attach_file /wp-content/uploads/2015/08/WinPlugin.exe
computer localhost send GET kids4mo.com attach_file /wp-content/uploads/2015/08/WinPlugin.exe

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 83.42%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 97.94%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 60.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 79.41%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 95.86%
suspicious: False cancel

Add to Collection
Download