Report #9060 check_circle

Binary
DLL
False cancel
Size
2.23MB
trid
68.4% Win32 EXE PECompact compressed
10.8% Win32 Dynamic Link Library
7.4% Win32 Executable
3.4% Win16/32 Executable Delphi generic
3.3% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
986586dc26bac2a8c26ca2dcf1e339ca
sha1
6367adfcad90532121620ba2dbb68147197f1209
crc32
0x142e67bb
sha224
90da7c942a4a560c070dadde9661455f840f0ff954f116f0458385f2
sha256
cc8f4276c2387bc228259e6502ef0c972c1bf2eb5477f9e92ea67729dbc11701
sha384
3a96d8deef1b5d5ec9fcaa3efeca23cd8fad555faf792b05ca99fde2c646653ea230ba32afc297b771c8b457bdabbad3
sha512
e056323ce3c08467619e88f5593a07c0e1316e7256c470499e9c78b63f00409bcea53ac826cb481437bb03105ec20e3494558e69907967bbbf47093101bfc44c
ssdeep
49152:8d1Mgyjvv119WhcSnhiDcCsQ0uTzTvRMHV+SYuTTG:0Kg+vv11IiPMHiA
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Dropper_Strings, CRC32_poly_Constant, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, win_files_operation, IsPE32, RijnDael_AES_CHAR, contentis_base64, screenshot, keylogger, win_mutex, win_hook, Delphi_Random, IsWindowsGUI, anti_dbg, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, MD5_Constants

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
t.Ht
Winapi.Windows
Winapi.Windows
Winapi.Windows
Uh.SG
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
Login%Cannot remove shell notification icon"%s requires Windows Vista or later
System.Win.Crtl
System.Win.Crtl
System.Win.ComConst
System.Win.ComConst
\Software\Borland\C++Builder
windowscodecs.dll
\Software\Borland\Delphi
B.rsrc
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
winspool.drv
winspool.drv
\Software\Borland\BDS
comctl32.dll
msimg32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
wtsapi32.dll
version.dll
wininet.dll
uxtheme.dll
uxtheme.dll
1.0.0.0
1.0.0.0
pontafirme.exe
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
Hashed list of file names is invalid
IsEncrypted
Encrypted
Username
Username
Username
Username
Password for "%s"
OnNavigated
System\2D

Foremost
Matches
0.exe, 2 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, ole32.dll, PSAPI.dll, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, comctl32.dll, NTDLL.DLL, wininet.dll, advapi32.dll, gdi32.dll, DWMAPI.DLL, msimg32.dll, wtsapi32.dll, windowscodecs.dll, shell32.dll, version.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 291840
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .edata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 2048832
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, ole32.dll, psapi.dll, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, comctl32.dll, ntdll.dll, wininet.dll, advapi32.dll, gdi32.dll, dwmapi.dll, msimg32.dll, wtsapi32.dll, windowscodecs.dll, shell32.dll, version.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2014-09-16 09:33:59
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 9
.text: 43
.itext: 5
.reloc: 1

pushpopmath
.data: 8
.rsrc: 2
.text: 32
.reloc: 128

garbagebytes
.data: 5
.text: 37
.itext: 5

hookdetection
.data: 1
.text: 1
.reloc: 21

software breakpoint
.text: 5
.reloc: 42

fakeconditionaljumps
.text: 3

programcontrolflowchange
.data: 5
.text: 34
.itext: 5

cpuinstructionsresultscomparison
.data: 9
.rsrc: 17
.text: 18
.reloc: 2

AVclass
banload
1
VirusTotal
md5
986586dc26bac2a8c26ca2dcf1e339ca
sha1
6367adfcad90532121620ba2dbb68147197f1209
SCANS (DETECTION RATE = 68.18%)
AVG
result: Win32:Banker-LVQ [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=86)
update: 20180324
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

ALYac
result: Trojan.GenericKD.1866926
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-LVQ [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.cvrn
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
update: 20180323
version: 5.4.30.7
detected: False cancel

DrWeb
update: 20180323
version: 7.0.28.2020
detected: False cancel

GData
result: Trojan.GenericKD.1866926
update: 20180323
version: A:25.16481B:25.11861
detected: True check_circle

Panda
result: Trj/Chgt.G
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20180323
version: 3.12.28.0
detected: False cancel

VIPRE
result: Trojan.Win32.Generic!SB.0
update: 20180323
version: 65478
detected: True check_circle

Zoner
update: 20180324
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!SB.0
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
result: UnclassifiedMalware
update: 20180323
version: 28733
detected: True check_circle

F-Prot
update: 20180323
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180323
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!986586DC26BA
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:4:EnBMBcjY0AM)
update: 20180323
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!M8s70XPUKX0
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.58729
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
update: 20180323
version: 1.0.0.831
detected: False cancel

Cylance
result: Unsafe
update: 20180324
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-downloader.Banload.Htvp
update: 20180324
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180323
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180324
version: v4.3.5
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.1866926
update: 20180323
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Banload.cvrn!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.1866926 (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.GenericKD.1866926
update: 20180323
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.UHR!tr.dldr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: TrojanDownloader.Banload.bgrr
update: 20180323
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180324
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180324
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banload.R124985
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan[Downloader]/Win32.Banload
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Banload.cvrn
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180323
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Dropper.c9f
update: 20180324
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Banload.cvrn
update: 20180323
version: 1.0
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.UHR
update: 20180323
version: 17107
detected: True check_circle

TrendMicro
result: TROJ_BANLOAD.JSP
update: 20180323
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180223
detected: False cancel

BitDefender
result: Trojan.GenericKD.1866926
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

Malwarebytes
result: Trojan.Banker.IM
update: 20180323
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180323
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.dwihoi
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.1866926
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.AdwareDealPly.vh
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_BANLOAD.JSP
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
66
sha256
cc8f4276c2387bc228259e6502ef0c972c1bf2eb5477f9e92ea67729dbc11701
scan_id
cc8f4276c2387bc228259e6502ef0c972c1bf2eb5477f9e92ea67729dbc11701-1521847194
resource
986586dc26bac2a8c26ca2dcf1e339ca
positives
45
scan_date
2018-03-23 23:19:54
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
10/3/2020 - 13:45:43.762Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
10/3/2020 - 13:45:43.762Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
10/3/2020 - 13:45:43.762Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
10/3/2020 - 13:45:43.762Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
10/3/2020 - 13:45:43.762Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
10/3/2020 - 13:45:43.762Unknown1480C:\malware.exeC:\Monitor
10/3/2020 - 13:45:43.762Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp\unist0909.txt
10/3/2020 - 13:45:43.762Open1480C:\malware.exeC:\Secur32.dll
10/3/2020 - 13:45:43.762Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
10/3/2020 - 13:45:43.778Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
10/3/2020 - 13:45:43.778Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
10/3/2020 - 13:45:43.778Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\IPHLPAPI.DLL
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\WINNSI.DLL
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
10/3/2020 - 13:45:43.778Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
10/3/2020 - 13:45:43.778Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\DNSAPI.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
10/3/2020 - 13:45:43.778Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
10/3/2020 - 13:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
10/3/2020 - 13:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
10/3/2020 - 13:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
10/3/2020 - 13:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
10/3/2020 - 13:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
10/3/2020 - 13:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
10/3/2020 - 13:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
10/3/2020 - 13:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
10/3/2020 - 13:45:43.997Open1480C:\malware.exeC:\dhcpcsvc6.DLL
10/3/2020 - 13:45:43.997Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
10/3/2020 - 13:45:43.997Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
10/3/2020 - 13:45:43.997Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
10/3/2020 - 13:45:43.997Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\CRYPTSP.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\RpcRtRemote.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
10/3/2020 - 13:45:44.43Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
10/3/2020 - 13:45:44.43Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.43Unknown1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
10/3/2020 - 13:45:44.43Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
10/3/2020 - 13:45:44.43Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
10/3/2020 - 13:45:44.43Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
10/3/2020 - 13:45:44.43Open1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
10/3/2020 - 13:45:44.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\dhcpcsvc.DLL
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
10/3/2020 - 13:45:44.59Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
10/3/2020 - 13:45:44.137Open1480C:\malware.exeC:\rasadhlp.dll
10/3/2020 - 13:45:44.137Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
10/3/2020 - 13:45:44.137Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
10/3/2020 - 13:45:44.231Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
10/3/2020 - 13:45:44.231Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
10/3/2020 - 13:45:45.309Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
10/3/2020 - 13:45:45.309Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
10/3/2020 - 13:45:46.528Unknown1480C:\malware.exeC:\Windows
10/3/2020 - 13:45:46.528Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc
10/3/2020 - 13:45:46.528Unknown1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
10/3/2020 - 13:45:46.528Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
10/3/2020 - 13:45:46.528Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
10/3/2020 - 13:45:43.778Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
10/3/2020 - 13:45:43.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
10/3/2020 - 13:45:43.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
10/3/2020 - 13:45:43.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
10/3/2020 - 13:45:43.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
10/3/2020 - 13:45:43.778Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
10/3/2020 - 13:45:44.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
10/3/2020 - 13:45:44.59Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
10/3/2020 - 13:45:44.231Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
10/3/2020 - 13:45:44.231Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
10/3/2020 - 13:45:44.231Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
10/3/2020 - 13:45:44.231Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
10/3/2020 - 13:45:45.543Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
10/3/2020 - 13:45:45.543Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
10/3/2020 - 13:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
10/3/2020 - 13:45:45.543Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code www.perpiweb.fr.
computer localhost arrow_forward computer gateway:50273 code www.perpiweb.fr.

Response

TCP
Info

UDP
Info
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 62.07%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 88.62%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 60.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 56.20%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 26.81%
suspicious: False cancel

Add to Collection
Download