Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
Score: 56
|
System: unknown
|
|
|
malicious
Score: 56
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior
|
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6518531C.wmf |
Targa image data - Map - RLE 65536 x 65536 x 0 "\004" | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A9E93BC7.wmf |
Targa image data - Map - RLE 65536 x 65536 x 0 "\004" | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AE470F5E.wmf |
Targa image data - Map - RLE 65536 x 65536 x 0 "\004" | # | |
Click to see the 7 hidden entries | |||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{ADF974D2-ACAE-49BD-8B79-296CBB4BE7F3}.tmp |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F1C4F945-3CC1-4A43-A98F-CD8DBA4A5802}.tmp |
data | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Enquiry.LNK |
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Sep 24 13:01:38 2017, mtime=Sun Sep 24 13:01:38 2017, atime=Wed Jan 22 21:08:15 2020, length=493433, window=hide | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm |
data | # | |
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex |
Little-endian UTF-16 Unicode text, with no line terminators | # | |
C:\Users\user\Desktop\~$nquiry.doc |
data | # |