Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
Score: 64
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
|
|
malicious
Score: 64
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass
|
Name | Detection |
---|---|
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t | |
https://gcc.gnu.org/bugs/): | |
https://sectigo.com/CPS0 | |
Click to see the 6 hidden entries | |
https://studio.youtube.comSAPISIDHASH | |
https://studio.youtube.comX-Originapplication/jsonContent-TypesessionTokenctx | |
http://ocsp.sectigo.com0 | |
https://studio.youtube.com | |
https://studio.youtube.com/reauth | |
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Ou0ZT4968y.exe_6d94c01abebf2aab25e322aa91a877df2b8acdd6_dac8cab9_0497fefa\Report.wer |
Unicode text, UTF-16, little-endian text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDFF8.tmp.dmp |
Mini DuMP crash report, 14 streams, Fri Nov 25 03:47:14 2022, 0x1205a4 type | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1AF.tmp.WERInternalMetadata.xml |
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators | # | |
Click to see the 2 hidden entries | |||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE24C.tmp.xml |
XML 1.0 document, ASCII text, with CRLF line terminators | # | |
\Device\ConDrv |
ASCII text, with no line terminators | # |