Report #8759 check_circle

  • Creation Date: March 5, 2020, 3:43 p.m.
  • Last Update: March 6, 2020, 12:51 a.m.
  • File: Documentos.pdf.exe
  • Results:
Binary
DLL
False cancel
Size
530.50KB
trid
46.3% Win32 Executable Borland Delphi 7
31.4% Win32 Executable Borland Delphi 5
18.2% Win32 Executable Borland Delphi 6
0.9% Win32 Executable Delphi generic
0.9% Windows screen saver
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
cea5bea04b809bee80395d64102ed3ad
sha1
28aa4eec76b4aadf71499eab2a345ed4a7742b06
crc32
0xe30a3644
sha224
02447a9407591cb9d02ea2416fdbd217957c7cb9dedcff6c50fe4fd2
sha256
a61d263ca5f46d4afd9dca009afab5d1b7ab6124a220fd8fa9769c20cde667c5
sha384
e986b5e7c5e51172f9b03957924cb28d60a338c70178e1942ffbffa7742315040c7a4598cddc30953c72aae8673fe798
sha512
53fc25f65c9aff9ac1ff0b47739c48d28136051173513b0e24e1aff0e3cd28286b92c1a2d74ce62c1f4245714d0cb725043ce7dc3ed383c1908a3a33a5d737e4
ssdeep
12288:Aok98jitPDHikjoSzHQ7LSl+5wehTAif8:l2BPWF2FlCVTAiU
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, network_smtp_raw, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, Delphi_DecodeDate, borland_delphi, Delphi_FormShow, network_dns, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, network_tcp_socket, screenshot, network_tcp_listen, Borland_Delphi_v40_v50, keylogger, contentis_base64, Borland_Delphi_40_additional, Borland_Delphi_40, Borland_Delphi_v60_v70, IsWindowsGUI, network_udp_sock, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, win_registry, Delphi_CompareCall, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30, Big_Numbers1, Big_Numbers0

Suspicious
True check_circle

Strings
List
t.Ht
Font.Name
Font.Style
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
127.0.0.1
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
uxtheme.dll
vcltest3.dll
0.0.0.1
Network is down.
Host is down.
Username
OnReceive$FE
Socket Error # %d
:I:w:T;
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
,%.%0%2%4%6%8%:%<%>%@%B%E%G%I%
\Deleted
X-Library
Bad address.
Socks server did not respond.$Invalid socks authentication method.%Authentication error to socks server.
Connected.
JumpID("","%s")
4%4a4s4
Socket is not connected..Cannot send or receive after socket is closed.#Too many references, cannot splice.
Connect timed out.
Command not supported.
Connection refused.
Already connected.
Too many open files.
Connection reset by peer.
Connection timed out.
Sub-menu is not in menu
Division by zero
Not Connected
UhBOA
August September
Selected
bsSizeToolWin
ToolWin
Rebuild
TaskbarCreated
Too many open files
hsConnected
Assertion failed
TStringStreaml%A
General SOCKS server failure."Connection not allowed by ruleset.
Resolving hostname %s.
%s (%s, line %d)
Socket is already connected.
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Privileged instruction(Exception %s in module %s at %p.
Error reading %s%s%s: %s
I/O error %d
Thread Error: %s (%d)
Thread creation error: %s
List count out of bounds (%d)
End of stream: %s at %d
Ancestor for '%s' not found
Connecting to %s.
Cannot assign a %s to a %s
Class %s not found
Property %s does not exist
Resource %s not found
#IdSMTP
OnDestroy
FormCreate OnDestroy
ESafecallException
OnHide
*ShellAPI
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
IDesignerHookH)A
#!V!W!"!&!r%!%#%%%'%)%c%e%g%C%<!"%$%&%(%*%+%-%/%1%3%5%7%9%;%=%?%A%D%F%H%J%K%L%M%N%O%R%U%X%[%^%_%`%a%b%d%f%h%i%j%k%l%m%o%s%+!,!
Password<
ftpAborted
D97AB241F57BD177E87ED41EB51844F3
020E09081358AF3142BD31B330BB32CE
TIdTCPConnection
IdTCPConnection
IdTCPConnection
TIdTCPConnection
EIdTCPConnectionError
ftpTransfer
ftpReady
Socket operation on non-socket.
ssShift
Cannot allocate socket.
ssHotTrack

Foremost
Matches
0.exe, 530 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: user32.dll, kernel32.dll, uxtheme.dll, vcltest3.dll, gdi32.dll, version.dll, comctl32.dll, MAPI32.DLL, imm32.dll, advapi32.dll, oleaut32.dll, WS2_32.DLL
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 105984
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 440204
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, gdi32.dll, version.dll, comctl32.dll, mapi32.dll, imm32.dll, advapi32.dll, oleaut32.dll, ws2_32.dll
hasLibs: True check_circle
Suspicious: vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 121
.rsrc: 3

pushpopmath
none: 16
.rsrc: 3
.reloc: 36

garbagebytes
none: 115
.rsrc: 1

hookdetection
none: 2
.reloc: 3

software breakpoint
.reloc: 5

programcontrolflowchange
none: 115
.rsrc: 1

cpuinstructionsresultscomparison
none: 14
.rsrc: 9

AVclass
banload
1
VirusTotal
md5
cea5bea04b809bee80395d64102ed3ad
sha1
28aa4eec76b4aadf71499eab2a345ed4a7742b06
SCANS (DETECTION RATE = 75.76%)
AVG
result: Win32:Banker-MHQ [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=86)
update: 20180323
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 004b0a691 )
update: 20180323
version: 10.42.26597
detected: True check_circle

ALYac
result: Gen:Variant.Delphi.Banker.1
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-MHQ [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Agent.543232.35
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.RDRU-9348
update: 20180323
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.DownLoad3.35955
update: 20180323
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Variant.Delphi.Banker.1
update: 20180323
version: A:25.16481B:25.11861
detected: True check_circle

Panda
result: Trj/CI.A
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
result: TScope.Trojan.Delf
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180323
version: 65478
detected: True check_circle

Zoner
result: Trojan.Agent
update: 20180323
version: 1.0
detected: True check_circle

AVware
result: Trojan.Win32.Generic!BT
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
result: TrojWare.Win32.TrojanDownloader.Dadobra.~JK
update: 20180323
version: 28732
detected: True check_circle

F-Prot
update: 20180323
version: 4.7.1.166
detected: False cancel

Ikarus
result: Backdoor.Win32.Yobdam
update: 20180323
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!CEA5BEA04B80
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
result: Malware.Undefined!8.C (TFE:5:2AK39MBX5TB)
update: 20180323
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Banspy-K
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Agent!3icZSHtV4jQ
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.61066
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Delphi.Banker.1
update: 20180323
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180323
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan.Agent.Tclx
update: 20180323
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180323
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180323
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Delphi.Banker.1
update: 20180323
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.W32.Generic!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Delphi.Banker.1 (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Delphi.Banker.1
update: 20180323
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.URO!tr.dldr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan/Generic.bibjj
update: 20180323
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180323
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180323
version: 1.0
detected: True check_circle

Symantec
result: Trojan Horse
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banload.C879271
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.TSGeneric
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180323
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180323
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180323
version: 1.0
detected: True check_circle

Cybereason
result: malicious.04b809
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.URO
update: 20180323
version: 17106
detected: True check_circle

TrendMicro
result: TROJ_BANLOAD.YWNFO
update: 20180323
version: 9.862.0.1074
detected: True check_circle

BitDefender
result: Gen:Variant.Delphi.Banker.1
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 004b0a691 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

Malwarebytes
update: 20180323
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Chepro.19597
update: 20180323
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.DownLoad3.dphrdn
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Delphi.Banker.1
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Dropper.hh
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_BANLOAD.YWNFO
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
66
sha256
a61d263ca5f46d4afd9dca009afab5d1b7ab6124a220fd8fa9769c20cde667c5
scan_id
a61d263ca5f46d4afd9dca009afab5d1b7ab6124a220fd8fa9769c20cde667c5-1521840316
resource
cea5bea04b809bee80395d64102ed3ad
positives
50
scan_date
2018-03-23 21:25:16
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
5/3/2020 - 23:46:9.340Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:9.340Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:10.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:10.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:10.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Secur32.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:10.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:10.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:10.418Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:10.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\IPHLPAPI.DLL
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\WINNSI.DLL
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\DNSAPI.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 23:46:10.465Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 23:46:10.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 23:46:10.512Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 23:46:10.559Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
5/3/2020 - 23:46:10.559Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
5/3/2020 - 23:46:10.606Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 23:46:10.606Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 23:46:10.606Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 23:46:10.606Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 23:46:10.653Open1480C:\malware.exeC:\dhcpcsvc6.DLL
5/3/2020 - 23:46:10.653Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 23:46:10.653Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 23:46:10.653Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 23:46:10.653Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\dhcpcsvc.DLL
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\CRYPTSP.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\RpcRtRemote.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 23:46:10.700Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 23:46:10.700Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 23:46:10.700Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 23:46:10.762Open1480C:\malware.exeC:\rasadhlp.dll
5/3/2020 - 23:46:10.762Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 23:46:10.762Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 23:46:10.809Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 23:46:10.809Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 23:46:11.28Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
5/3/2020 - 23:46:11.28Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\malware.exe.Local
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 23:46:11.90Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.90Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 23:46:11.559Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8
5/3/2020 - 23:46:11.559Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8
5/3/2020 - 23:46:11.559Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htm
5/3/2020 - 23:46:11.559Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htm
5/3/2020 - 23:46:11.559Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htm
5/3/2020 - 23:46:11.559Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.txt
5/3/2020 - 23:46:11.559Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Write1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.txt
5/3/2020 - 23:46:11.559Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.txt
5/3/2020 - 23:46:11.559Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.559Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EHQ10TF8\musica[1].htmmusica[1].htm
5/3/2020 - 23:46:11.981Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 23:46:11.981Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.txt
5/3/2020 - 23:46:16.559Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.txt
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\
5/3/2020 - 23:46:16.559Unknown1480C:\malware.exeC:\
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Program Files (x86)\GbPlugin
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Program Files (x86)\Scpad
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Program Files (x86)\AVG
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Program Files (x86)\AVAST Software
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Program Files (x86)\Avira
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Program Files (x86)\ESET
5/3/2020 - 23:46:16.559Open1480C:\malware.exeC:\Program Files (x86)\Kaspersky Lab
5/3/2020 - 23:46:17.497Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.txt
5/3/2020 - 23:46:17.497Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.zip
5/3/2020 - 23:46:17.497Read1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\musica.txt
5/3/2020 - 23:46:17.590Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
5/3/2020 - 23:46:17.590Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
5/3/2020 - 23:46:10.465Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
5/3/2020 - 23:46:10.465Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
5/3/2020 - 23:46:10.465Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
5/3/2020 - 23:46:10.465Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
5/3/2020 - 23:46:10.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
5/3/2020 - 23:46:10.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
5/3/2020 - 23:46:10.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
5/3/2020 - 23:46:10.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
5/3/2020 - 23:46:10.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:46:10.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:46:10.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:46:10.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
5/3/2020 - 23:46:12.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:46:12.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 23:46:12.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 23:46:12.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:59829 code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code supertatico.com.br.
computer localhost arrow_forward computer gateway:50273 code advmcoelho.com.br.
computer localhost arrow_forward computer gateway:DNS code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code advmcoelho.com.br.

Response
computer gateway:DNS arrow_forward computer localhost code dns.msftncsi.com. reply_all 131.107.255.255

computer gateway:DNS arrow_forward computer localhost code advmcoelho.com.br. reply_all 216.172.161.17


TCP
Info
computer localhost:65191 arrow_forward 216.172.161.17:80
216.172.161.17:80 arrow_forward computer localhost:65191

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:59829
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:59829 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info
computer localhost send GET advmcoelho.com.br attach_file /images/musica.txt

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 80.43%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 64.76%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 56.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 47.31%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 89.71%
suspicious: True check_circle

Add to Collection
Download