Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 100
|
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
|
IP | Country | Detection |
---|---|---|
104.168.33.25 | United States | |
154.222.70.249 | Seychelles |
Name | IP | Detection |
---|---|---|
www.xinli-ac.com | 154.222.70.249 | |
www.insurancecentral.info | 0.0.0.0 |
Name | Detection |
---|---|
www.worklifefirewalls.com/m9y5/ | |
http://104.168.33.25/gtb/vbc.exej | |
http://104.168.33.25/gtb/vbc.exehhC: | |
Click to see the 27 hidden entries | |
http://104.168.33.25/gtb/vbc.exe | |
https://support.mozilla.org | |
http://www.piriform.com/ccleanerv | |
http://www.autoitscript.com/autoit3 | |
http://www.%s.comPA | |
http://computername/printers/printername/.printer | |
http://www.piriform.com/ccleaner | |
http://investor.msn.com/ | |
http://www.windows.com/pctv. | |
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv | |
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. | |
http://www.icra.org/vocabulary/. | |
http://java.sun.com | |
http://servername/isapibackend.dll | |
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check | |
http://treyresearch.net | |
http://www.hotmail.com/oe | |
http://windowsmedia.com/redir/services.asp?WMPFriendly=true | |
http://nsis.sf.net/NSIS_ErrorError | |
http://www.xinli-ac.com/m9y5/?3f=ylBe/k3Uhk7dBIeXI//KFRH0TaC7pxYziRrYgQ8MI5uD9iOXGI4rYw0cjZ+4cEk1rP/qTw==&-Z=f4l0drr | |
http://www.piriform.com/ccleaner1SPS0 | |
http://www.mozilla.com0 | |
http://www.piriform.com/ccleanerq | |
http://www.iis.fhg.de/audioPA | |
http://wellformedweb.org/CommentAPI/ | |
http://www.msnbc.com/news/ticker.txt | |
http://investor.msn.com |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe |
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive | # | |
C:\Users\user\AppData\Local\Temp\fdvucso.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\Desktop\~$New order.xlsx |
data | # | |
Click to see the 13 hidden entries | |||
C:\Users\Public\vbc.exe |
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B8C79A7.wmf |
ms-windows metafont .wmf | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C67416EA.wmf |
ms-windows metafont .wmf | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D915B94D.wmf |
ms-windows metafont .wmf | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F22AACBE.emf |
Windows Enhanced Metafile (EMF) image data version 0x10000 | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FE9B77C.wmf |
ms-windows metafont .wmf | # | |
C:\Users\user\AppData\Local\Temp\kk2f9zwlwvo3ghi9f9 |
data | # | |
C:\Users\user\AppData\Local\Temp\nsbF6CE.tmp |
data | # | |
C:\Users\user\AppData\Local\Temp\wqqynoeqp |
data | # | |
C:\Users\user\AppData\Local\Temp\~DF43C5C58FDDE0F3A8.TMP |
data | # | |
C:\Users\user\AppData\Local\Temp\~DFA5230667FEC71F99.TMP |
CDFV2 Encrypted | # | |
C:\Users\user\AppData\Local\Temp\~DFDC892710C54AAC44.TMP |
data | # | |
C:\Users\user\AppData\Local\Temp\~DFFA1DA6C3CBA16E75.TMP |
data | # |