Report #8756 check_circle

  • Creation Date: March 5, 2020, 3:43 p.m.
  • Last Update: March 6, 2020, 12:37 a.m.
  • File: documentos.exe
  • Results:
Binary
DLL
False cancel
Size
2.72MB
trid
76.7% Win32 EXE PECompact compressed
8.3% Win32 Executable
3.8% Win16/32 Executable Delphi generic
3.7% OS/2 Executable
3.6% Generic Win/DOS Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
b42aef6f073988385cbe8570c809bfb5
sha1
29ad26924072d914c549503b90980bd0dacb04e1
crc32
0x2e88c05f
sha224
6533077bfb5da628f9bcb902eb075e37ae2a03080fa86fcfcafac26f
sha256
8c1c7ccfb9b4249dc43eb9e4cf4e561eb8e160320d9c899ffa3640cb9a0727b6
sha384
a8dd841ba5aee8e1fff4925c15b885d0df8f27fb453d7fc7325817a433232e8e66b7a49dd35e67a051755d0d2e821612
sha512
6fbd814bbceaabaef0082a1bffe6cb25872d2448fd34ce4fab085574353109f71ea681286aebe4566364032d2b33ee45b0053df451ae9394ac7684ca3f92ae8f
ssdeep
49152:ErI0k3yiEpj2NJCbsQHhbrdASye7vg1a6+bLQkKNwuPSaozTTO+rtQ:Uckp1dbLiKTOh
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, VirtualBox_Detection, CRC32_poly_Constant, RIPEMD160_Constants, borland_delphi, VMWare_Detection, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, win_mutex, screenshot, Borland_Delphi_v40_v50, keylogger, MD5_Constants, Borland_Delphi_40_additional, VirtualPC_Detection, Borland_Delphi_40, vmdetect, Delphi_Random, IsWindowsGUI, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, contentis_base64, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
http://intelbras.r.worldssl.net/sw4.zip
Web site: http://www.componentace.com
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
t.Ht
Winapi.Windows
Winapi.Windows
Winapi.Windows
Font.Name
Font.Name
Font.Name
Font.Style
Font.Name
Font.Style
Font.Style
Font.Style
h.tc
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
\\\\.\\\VBoxMiniRdrDN
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
VBoxHook.dll
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
Login%Cannot remove shell notification icon"%s requires Windows Vista or later
System.Win.Crtl
System.Win.Crtl
System.Win.ComConst
System.Win.ComConst
\Software\Borland\C++Builder
windowscodecs.dll
\Software\Borland\Delphi
B.rsrc
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
winspool.drv
winspool.drv
\Software\Borland\BDS
comctl32.dll
wtsapi32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
msimg32.dll
comctl32.dll
version.dll
uxtheme.dll
wininet.dll
uxtheme.dll
1.0.0.0
1.0.0.0
ntdll.dll

Foremost
Matches
0.exe, 2 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://intelbras.r.worldssl.net/sw4.zip, http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: http://intelbras.r.worldssl.net/sw4.zip, Kernel32.dll, user32.dll, comctl32.dll, ole32.dll, PSAPI.dll, ntdll.dll, imm32.dll, VBoxHook.dll, oleaut32.dll, uxtheme.dll, wininet.dll, advapi32.dll, gdi32.dll, DWMAPI.DLL, msimg32.dll, wtsapi32.dll, windowscodecs.dll, version.dll, shell32.dll
hasFiles: True check_circle
Suspicious: Data.DB
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 361472
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .edata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 2500036
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: kernel32.dll, user32.dll, comctl32.dll, ole32.dll, psapi.dll, ntdll.dll, imm32.dll, oleaut32.dll, uxtheme.dll, wininet.dll, advapi32.dll, gdi32.dll, dwmapi.dll, msimg32.dll, wtsapi32.dll, windowscodecs.dll, version.dll, shell32.dll
hasLibs: True check_circle
Suspicious: vboxhook.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2015-04-15 07:46:33
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 9
.rsrc: 1
.text: 52
.itext: 6

pushpopmath
.data: 8
.rsrc: 6
.text: 35
.reloc: 164

garbagebytes
.data: 5
.rsrc: 1
.text: 44
.itext: 6

hookdetection
.data: 1
.text: 3
.reloc: 18

software breakpoint
.text: 5
.reloc: 54

fakeconditionaljumps
.rsrc: 2
.text: 3

programcontrolflowchange
.data: 5
.rsrc: 1
.text: 41
.itext: 6

cpuinstructionsresultscomparison
.data: 9
.rsrc: 22
.text: 33
.reloc: 2

AVclass
banload
1
VirusTotal
md5
b42aef6f073988385cbe8570c809bfb5
sha1
29ad26924072d914c549503b90980bd0dacb04e1
SCANS (DETECTION RATE = 71.21%)
AVG
result: Win32:Banker-LVQ [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180324
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=80)
update: 20180325
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180325
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan ( 7000000f1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

ALYac
result: Gen:Variant.Zusy.137469
update: 20180325
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-LVQ [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.2855424
update: 20180324
version: 8.3.3.6
detected: True check_circle

Baidu
result: Win32.Trojan.WisdomEyes.16070401.9500.9965
update: 20180323
version: 1.0.0.2
detected: True check_circle

Cyren
result: W32/Trojan.PGEP-9384
update: 20180325
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.DownLoader13.920
update: 20180325
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Variant.Zusy.137469
update: 20180325
version: A:25.16495B:25.11872
detected: True check_circle

Panda
result: Trj/Genetic.gen
update: 20180324
version: 4.6.4.2
detected: True check_circle

VBA32
result: Trojan.Downloader
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180325
version: 65508
detected: True check_circle

Zoner
update: 20180325
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180325
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180325
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180325
detected: False cancel

F-Prot
update: 20180325
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180324
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericR-DKW!B42AEF6F0739
update: 20180325
version: 6.0.6.653
detected: True check_circle

Rising
result: Trojan.DL.Win32.Banloaden.mo (CLASSIC)
update: 20180325
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180325
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!K2Th/e6mncg
update: 20180324
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.62180
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Zusy.D218FD
update: 20180325
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180325
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan.Generic.Pcsg
update: 20180325
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180325
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Zusy.137469
update: 20180325
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Banload.aabnd!c
update: 20180325
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Zusy.137469 (B)
update: 20180325
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Zusy.137469
update: 20180325
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/ProxyChanger.NM!tr
update: 20180325
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
update: 20180325
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180325
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180325
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180324
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180325
version: 2018-03-25.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Downloader.R143385
update: 20180324
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan[Downloader]/Win32.Banload
update: 20180325
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180325
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180325
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 1.0
detected: True check_circle

ESET-NOD32
result: Win32/TrojanDownloader.Banload.VNB
update: 20180325
version: 17111
detected: True check_circle

TrendMicro
update: 20180327
version: 9.862.0.1074
detected: False cancel

WhiteArmor
update: 20180324
detected: False cancel

BitDefender
result: Gen:Variant.Zusy.137469
update: 20180325
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_60% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 7000000f1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180324
version: 180324-00
detected: False cancel

Malwarebytes
result: Trojan.Banker.IM
update: 20180325
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180325
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180324
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.dqoqnw
update: 20180325
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Zusy.137469
update: 20180325
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180325
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Dropper.vh
update: 20180324
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0DBF18
update: 20180325
version: 9.950.0.1006
detected: True check_circle

total
66
sha256
8c1c7ccfb9b4249dc43eb9e4cf4e561eb8e160320d9c899ffa3640cb9a0727b6
scan_id
8c1c7ccfb9b4249dc43eb9e4cf4e561eb8e160320d9c899ffa3640cb9a0727b6-1521959386
resource
b42aef6f073988385cbe8570c809bfb5
positives
47
scan_date
2018-03-25 06:29:46
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
5/3/2020 - 23:45:43.918Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
5/3/2020 - 23:45:43.918Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
5/3/2020 - 23:45:43.918Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
5/3/2020 - 23:45:43.918Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
5/3/2020 - 23:45:43.934Open1480C:\malware.exeC:\malware.exe.Local
5/3/2020 - 23:45:43.934Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
5/3/2020 - 23:45:43.934Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
5/3/2020 - 23:45:43.934Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.mui
5/3/2020 - 23:45:43.950Read1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.muicomctl32.dll.mui
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\malware.exe.Local
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 23:45:43.950Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
5/3/2020 - 23:45:43.950Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
5/3/2020 - 23:45:43.950Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
5/3/2020 - 23:45:43.965Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Windows\system\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Windows\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Monitor\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Windows\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\VBoxHook.dll
5/3/2020 - 23:45:43.981Open1480C:\malware.exe\Device\Mup\VBoxMiniRdrDN\
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\modelo.zip
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\flashp.exe
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Secur32.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:13.981Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:13.981Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:13.981Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\IPHLPAPI.DLL
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\WINNSI.DLL
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:13.981Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:13.981Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\DNSAPI.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 23:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 23:46:14.90Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 23:46:14.90Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 23:46:14.90Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 23:46:14.90Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 23:46:14.137Open1480C:\malware.exeC:\dhcpcsvc6.DLL
5/3/2020 - 23:46:14.137Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 23:46:14.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 23:46:14.137Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 23:46:14.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\CRYPTSP.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\RpcRtRemote.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:14.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:14.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:14.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:14.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.200Unknown1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:14.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 23:46:14.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 23:46:14.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\dhcpcsvc.DLL
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 23:46:14.200Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 23:46:14.247Open1480C:\malware.exeC:\rasadhlp.dll
5/3/2020 - 23:46:14.247Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 23:46:14.247Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 23:46:14.340Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 23:46:14.340Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 23:46:15.512Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 23:46:15.512Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 23:46:43.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\modelo.zip
5/3/2020 - 23:46:43.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\flashp.exe
5/3/2020 - 23:47:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\modelo.zip
5/3/2020 - 23:47:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\flashp.exe
5/3/2020 - 23:47:43.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\modelo.zip
5/3/2020 - 23:47:43.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\flashp.exe
5/3/2020 - 23:48:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\modelo.zip
5/3/2020 - 23:48:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\flashp.exe
5/3/2020 - 23:48:43.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\modelo.zip
5/3/2020 - 23:48:43.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\flashp.exe
5/3/2020 - 23:49:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\modelo.zip
5/3/2020 - 23:49:13.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\flashp.exe

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
5/3/2020 - 23:46:13.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
5/3/2020 - 23:46:13.981Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
5/3/2020 - 23:46:13.981Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
5/3/2020 - 23:46:13.981Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
5/3/2020 - 23:46:13.981Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
5/3/2020 - 23:46:13.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
5/3/2020 - 23:46:14.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
5/3/2020 - 23:46:14.200Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
5/3/2020 - 23:46:14.340Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:46:14.340Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:46:14.340Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:46:14.340Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
5/3/2020 - 23:46:15.700Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:46:15.700Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:46:15.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:46:15.700Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:47:14.215Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:47:14.215Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:47:14.215Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:47:14.215Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
5/3/2020 - 23:47:15.293Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:47:15.293Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:47:15.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:47:15.293Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:48:44.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:48:44.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:48:44.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:48:44.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
5/3/2020 - 23:48:45.465Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:48:45.465Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:48:45.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:48:45.465Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code intelbras.r.worldssl.net.
computer localhost arrow_forward computer gateway:50273 code intelbras.r.worldssl.net.

Response

TCP
Info

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 66.48%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 75.28%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 66.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 60.55%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 64.49%
suspicious: False cancel

Add to Collection
Download