top title background image
flash

https://u.to/6xiJFw

Status: finished
Submission Time: 2020-05-25 04:07:35 +02:00
Clean

Comments

Tags

Details

  • Analysis ID:
    232697
  • API (Web) ID:
    361635
  • Analysis Started:
    2020-05-25 04:07:35 +02:00
  • Analysis Finished:
    2020-05-25 04:11:19 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
clean
Score: 0
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
195.216.243.155
United Kingdom
186.202.153.162
Brazil
87.250.250.119
Russian Federation
Click to see the 1 hidden entries
88.212.201.204
Russian Federation

Domains

Name IP Detection
u.to
195.216.243.155
mc.yandex.ru
87.250.250.119
counter.yadro.ru
88.212.201.204
Click to see the 3 hidden entries
facchiniassessoria.com.br
186.202.153.162
site-cdn.onenote.net
0.0.0.0
www.facchiniassessoria.com.br
0.0.0.0

URLs

Name Detection
http://www.facchiniassessoria.com.br/_backup/site1_old/v1/site/homedir/formtest/newhomesearch.php/pe
http://www.facchiniassessoria.com.br/site/favicon.ico
http://www.nytimes.com/
Click to see the 11 hidden entries
http://www.facchiniassessoria.com.br/favicon.ico
https://u.to/6xiJFw
http://www.youtube.com/
http://www.wikipedia.com/
https://u.to/6xiJFwRoot
http://www.amazon.com/
http://www.live.com/
http://www.reddit.com/
http://www.twitter.com/
http://facchiniassessoria.com.br/site/favicon.ico
http://www.facchiniassessoria.com.br/_backup/site1_old/v1/site/homedir/formtest/newhomesearch.php/pezf/dyns/?spread=vky1s0cr5w9f0sqb

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DFBB6D634F095F0A91.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB484202FA2B75163.TMP
data
#
Click to see the 14 hidden entries
C:\Users\user\AppData\Local\Temp\~DF519527B49680F45F.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\6xiJFw[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FDB732A8-9E77-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-314712940\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FDB732AB-9E77-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FDB732AA-9E77-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#