Report #9582 check_circle

Binary
DLL
False cancel
Size
1.34MB
trid
64.7% Win32 EXE PECompact compressed
15.5% DOS Borland compiled Executable
7.0% Win32 Executable
3.2% Win16/32 Executable Delphi generic
3.1% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
e3dd4904dc6a7fed899d3a2f4bbdb2d9
sha1
62f8f56c2aa5745e87e59096f9efc2d1b50f257f
crc32
0xcce5d0a0
sha224
711f5bb17028d627c71714e06e2ad3ec1330fc84d9823cfc5d8c5fc3
sha256
cd1ee7fed76dc7b2385d078d2d1b40e5eeff2497c7bc30308382b6d3fe68d375
sha384
3055563d2955a4f573babb2e77d066d35fd82a751ee75a6a9fdae29f7e37aca2396a4f6bec88dcccc4042b7a086b32a9
sha512
d6fa3112ab2bf4370bf645dd4a40d31ffb9e8ee3cb577c75bb09b50e5cb63ef0d2a921cd030857e057e1f80865421f090afff2d9553e4eb98ac8b0af0352a6c0
ssdeep
24576:zia4KaJKKiZ3xCWFnWC1BWrBvStgPMk8L1ZI+6ziNLMg9e/+gIxmzOj8c1Ho7BFB:maYUKgZGpSe8LkiHo7BFi3TT/9Ol95
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, Borland_Delphi_30_, network_dropper, CRC32_poly_Constant, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, contentis_base64, screenshot, Borland_Delphi_v40_v50, keylogger, MD5_Constants, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, Borland_Delphi_v60_v70, IsWindowsGUI, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
http://bazar7km.com/Asset/css/syswin.zip
Web site: http://www.componentace.com
t.Ht
Font.Name
Font.Style
\syswin.zip
C:\Builds\TP\rtl\sys\SysUtils.pas
C:\Builds\TP\rtl\sys\SysUtils.pas
C:\Builds\TP\rtl\sys\SysUtils.pas
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
C:\Builds\TP\rtl\common\TypInfo.pas
C:\Builds\TP\rtl\common\Classes.pas
C:\Builds\TP\rtl\common\Classes.pas
C:\Builds\TP\rtl\common\SyncObjs.pas
\Software\Borland\C++Builder
windowscodecs.dll
\Software\Borland\Delphi
B.rsrc
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
winspool.drv
winspool.drv
\Software\Borland\BDS
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
msimg32.dll
comctl32.dll
comctl32.dll
version.dll
uxtheme.dll
uxtheme.dll
\syswin.exe
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
Hashed list of file names is invalid
IsEncrypted
Encrypted
Password for "%s"
OnNavigated
TProtection;
TProtection@
HelpSystem\
""fD**~T
UhB_O
UhS-D
Uho,E
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
System\
Software\Embarcadero\Locales
UhB0E
8%8F8N8h8
1%1A1R1r1
tsUpperTrackVertPressed
tsGripperVertPressed
tsThumbBtnVertPressed
Reserved3
r;%|E
dwReserved0
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread2Cannot call Start on a running or suspended thread;Cannot call CheckTerminated on an externally created thread9Cannot call SetReturnValue on an externally create thread'Parameter %s cannot be a negative value*Input buffer exceeded for %s = %d, %s = %d The specified file was not found$No help viewer that supports filters2Length of Strings and Objects arrays must be equal
StrictDelimiter\
DefocusControl
Software\CodeGear\Locales
HandleAllocated
HandleAllocated
HandleAllocated
HandleAllocated
HandleAllocated
HandleAllocated
HandleAllocated
wifTiff
FTerminated
tpDownPressed
Sub-menu is not in menu
Cannot compress file '%s'. Zip64 mode is not enabled
tpUpPressed
%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usable2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Division by zero
Count
Count
List
Count
Next
Count
Delete
Count
Delete
Count
Writer
Count
Writer
List
Count
Count

Foremost
Matches
0.exe, 1 MB, 2450.png, 50 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://bazar7km.com/asset/css/syswin.zip, http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: http://bazar7km.com/Asset/css/syswin.zip, user32.dll, ole32.dll, PSAPI.dll, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, comctl32.dll, NTDLL.DLL, URLMON.DLL, gdi32.dll, DWMAPI.DLL, advapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasFiles: True check_circle
Suspicious: \syswin.zip
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 366080
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 1043716
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, ole32.dll, psapi.dll, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, comctl32.dll, ntdll.dll, urlmon.dll, gdi32.dll, dwmapi.dll, advapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2014-05-26 17:58:14
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 8
.rsrc: 77
.text: 38
.itext: 4
.reloc: 1

pushpopmath
.data: 9
.rsrc: 24
.text: 18
.idata: 2
.reloc: 62

garbagebytes
.data: 4
.rsrc: 31
.text: 30
.itext: 4
.reloc: 1

hookdetection
.rsrc: 1
.text: 2
.reloc: 7

software breakpoint
.text: 4
.reloc: 22

fakeconditionaljumps
.rsrc: 1
.text: 1

programcontrolflowchange
.data: 4
.rsrc: 30
.text: 29
.itext: 4
.reloc: 1

cpuinstructionsresultscomparison
.data: 7
.rsrc: 22
.text: 13
.reloc: 1

AVclass
banload
1
VirusTotal
md5
e3dd4904dc6a7fed899d3a2f4bbdb2d9
sha1
62f8f56c2aa5745e87e59096f9efc2d1b50f257f
SCANS (DETECTION RATE = 75.38%)
AVG
result: Win32:Dropper-gen [Drp]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180324
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=83)
update: 20180325
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180325
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 0049ace81 )
update: 20180325
version: 10.42.26601
detected: True check_circle

ALYac
result: Gen:Variant.Zusy.96622
update: 20180325
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Dropper-gen [Drp]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Agent.1405952
update: 20180324
version: 8.3.3.6
detected: True check_circle

Baidu
result: Win32.Trojan.WisdomEyes.16070401.9500.9830
update: 20180323
version: 1.0.0.2
detected: True check_circle

Cyren
result: W32/Trojan.YUFI-8484
update: 20180325
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.DownLoader18.1409
update: 20180325
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Variant.Zusy.96622
update: 20180325
version: A:25.16495B:25.11872
detected: True check_circle

Panda
result: Trj/CI.A
update: 20180324
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.h
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180325
version: 65508
detected: True check_circle

Zoner
update: 20180325
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180325
version: 1.5.0.42
detected: True check_circle

Comodo
update: 20180325
detected: False cancel

F-Prot
update: 20180325
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180324
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericR-DVB!E3DD4904DC6A
update: 20180325
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:5:n7d8kXev7SJ)
update: 20180325
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180325
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!iI1qI6XmslU
update: 20180324
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20180323
version: 2.0.0.3519
detected: False cancel

Arcabit
result: Trojan.Zusy.D1796E
update: 20180325
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180325
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan.Generic.Alir
update: 20180325
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180325
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Zusy.96622
update: 20180325
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Banload.cvho!c
update: 20180325
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Zusy.96622 (B)
update: 20180325
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Zusy.96622
update: 20180325
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.TZM!tr.dldr
update: 20180325
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan.Generic.nlsi
update: 20180325
version: 16.0.100
detected: True check_circle

Kingsoft
result: Win32.Troj.Undef.(kcloud)
update: 20180325
version: 2013.8.14.323
detected: True check_circle

Paloalto
result: generic.ml
update: 20180325
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen
update: 20180324
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180325
version: 2018-03-25.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banload.C489002
update: 20180324
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.SGeneric
update: 20180325
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180325
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Downloader.3b8
update: 20180325
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 1.0
detected: True check_circle

ESET-NOD32
result: Win32/TrojanDownloader.Banload.TOY
update: 20180325
version: 17111
detected: True check_circle

TrendMicro
result: TROJ_BANLOAD.YAA
update: 20180325
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180324
detected: False cancel

BitDefender
result: Gen:Variant.Zusy.96622
update: 20180325
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_80% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 0049ace81 )
update: 20180325
version: 10.42.26601
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180324
version: 180324-00
detected: False cancel

Malwarebytes
result: Trojan.Downloader
update: 20180325
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180325
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180324
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.DownLoad3.czuizq
update: 20180325
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Zusy.96622
update: 20180325
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180325
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: GenericR-DVB!E3DD4904DC6A
update: 20180324
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_BANLOAD.YAA
update: 20180325
version: 9.950.0.1006
detected: True check_circle

total
65
sha256
cd1ee7fed76dc7b2385d078d2d1b40e5eeff2497c7bc30308382b6d3fe68d375
scan_id
cd1ee7fed76dc7b2385d078d2d1b40e5eeff2497c7bc30308382b6d3fe68d375-1521961586
resource
e3dd4904dc6a7fed899d3a2f4bbdb2d9
positives
49
scan_date
2018-03-25 07:06:26
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
13/3/2020 - 12:45:42.731Read1480C:\malware.exeC:\malware.exe
13/3/2020 - 12:45:42.731Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
13/3/2020 - 12:45:42.731Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
13/3/2020 - 12:45:42.731Open1480C:\malware.exeC:\dwmapi.dll
13/3/2020 - 12:45:42.731Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
13/3/2020 - 12:45:42.731Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
13/3/2020 - 12:45:42.731Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
13/3/2020 - 12:45:42.731Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
13/3/2020 - 12:45:42.731Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
13/3/2020 - 12:45:42.731Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
13/3/2020 - 12:45:42.747Open1480C:\malware.exeC:\malware.exe.Local
13/3/2020 - 12:45:42.747Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
13/3/2020 - 12:45:42.747Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
13/3/2020 - 12:45:42.747Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
13/3/2020 - 12:45:42.747Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.mui
13/3/2020 - 12:45:42.747Read1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.muicomctl32.dll.mui
13/3/2020 - 12:45:42.747Open1480C:\malware.exeC:\Windows\Fonts\sserife.fon
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\malware.exe.Local
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 12:45:42.762Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
13/3/2020 - 12:45:42.762Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
13/3/2020 - 12:45:42.762Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
13/3/2020 - 12:45:42.762Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\syswin.zip
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 12:45:42.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 12:45:42.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Secur32.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 12:45:42.825Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 12:45:42.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 12:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 12:45:42.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\IPHLPAPI.DLL
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\WINNSI.DLL
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\DNSAPI.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
13/3/2020 - 12:45:42.887Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 12:45:42.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
13/3/2020 - 12:45:42.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
13/3/2020 - 12:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
13/3/2020 - 12:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
13/3/2020 - 12:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
13/3/2020 - 12:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
13/3/2020 - 12:45:43.122Open1480C:\malware.exeC:\dhcpcsvc6.DLL
13/3/2020 - 12:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
13/3/2020 - 12:45:43.122Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
13/3/2020 - 12:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
13/3/2020 - 12:45:43.122Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\dhcpcsvc.DLL
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\CRYPTSP.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\RpcRtRemote.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
13/3/2020 - 12:45:43.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
13/3/2020 - 12:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
13/3/2020 - 12:45:43.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
13/3/2020 - 12:45:43.231Open1480C:\malware.exeC:\rasadhlp.dll
13/3/2020 - 12:45:43.231Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
13/3/2020 - 12:45:43.231Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
13/3/2020 - 12:45:43.278Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
13/3/2020 - 12:45:43.278Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
13/3/2020 - 12:45:44.418Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
13/3/2020 - 12:45:44.418Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
13/3/2020 - 12:45:45.762Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\syswin.zip

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
13/3/2020 - 12:45:42.887Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
13/3/2020 - 12:45:42.887Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
13/3/2020 - 12:45:42.887Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
13/3/2020 - 12:45:42.887Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
13/3/2020 - 12:45:42.887Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
13/3/2020 - 12:45:42.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
13/3/2020 - 12:45:42.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
13/3/2020 - 12:45:42.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
13/3/2020 - 12:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 12:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 12:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 12:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
13/3/2020 - 12:45:44.653Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 12:45:44.653Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 12:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 12:45:44.653Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code bazar7km.com.
computer localhost arrow_forward computer gateway:50273 code bazar7km.com.

Response

TCP
Info

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 78.03%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 88.07%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 82.39%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 94.12%
suspicious: True check_circle

Add to Collection
Download