Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
Score: 56
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
|
|
malicious
Score: 100
|
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering
|
IP | Country | Detection |
---|---|---|
142.250.186.46 | United States | |
142.250.185.161 | United States | |
216.218.206.36 | United States |
Name | IP | Detection |
---|---|---|
drive.google.com | 142.250.186.46 | |
googlehosted.l.googleusercontent.com | 142.250.185.161 | |
mail.prgisi.com | 216.218.206.36 | |
Click to see the 1 hidden entries | ||
doc-04-9o-docs.googleusercontent.com | 0.0.0.0 |
Name | Detection |
---|---|
https://github.com/Pester/Pester | |
http://AzAPmg.com | |
https://api.ipify.org% | |
Click to see the 24 hidden entries | |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | |
https://doc-04-9o-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eo32nv6hlr1tkp3eh3vjbce1k0vd1dfr/1664806350000/11764323936253178614/*/1PlMJJbtOYPK_UFYPas9qhiHRn_ix8EHC?e=download&uuid=b16c09ae-0bb5-4390-9a1a-296b303d6b25 | |
https://a1BgY4r4bA.com | |
https://doc-04-9o-docs.googleusercontent.com/ | |
http://DynDns.comDynDNSnamejidpasswordPsi/Psi | |
https://nuget.org/nuget.exe | |
https://contoso.com/ | |
https://drive.google.com/ | |
https://aka.ms/pscore6lB | |
https://a1BgY4r4bA.comt- | |
https://sectigo.com/CPS | |
http://127.0.0.1:HTTP/1.1 | |
https://doc-04-9o-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eo32nv6h | |
https://api.ipify.org%mail.prgisi.comjcvaleroso | |
https://support.google.com/chrome/?p=plugin_flash | |
http://mail.prgisi.com | |
https://contoso.com/Icon | |
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www | |
https://contoso.com/License | |
http://www.apache.org/licenses/LICENSE-2.0.html | |
http://pesterbdd.com/images/Pester.png | |
https://drive.google.com/y | |
https://sectigo.com/CPS0 | |
http://nuget.org/NuGet.exe |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.0.cs |
UTF-8 Unicode (with BOM) text | # | |
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.cmdline |
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache |
data | # | |
Click to see the 9 hidden entries | |||
C:\Users\user\AppData\Local\Temp\RESA2B2.tmp |
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fo0nlcmw.oxc.ps1 |
ASCII text, with no line terminators | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mfxogem4.yt2.psm1 |
ASCII text, with no line terminators | # | |
C:\Users\user\AppData\Local\Temp\sepi5xx1\CSC7F7A267C826A46D5AA3589EC91649B9.TMP |
MSVC .res | # | |
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.dll |
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.out |
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators | # | |
C:\Users\user\AppData\Roaming\5drowjrx.mtw\Chrome\Default\Cookies |
SQLite 3.x database, last written using SQLite version 3036000 | # | |
C:\Users\user\AppData\Roaming\5drowjrx.mtw\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite |
SQLite 3.x database, user version 12, last written using SQLite version 3036000 | # | |
\Device\ConDrv |
ASCII text, with CRLF line terminators | # |