Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 64
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
|
|
malicious
Score: 64
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass
|
IP | Country | Detection |
---|---|---|
2.0.9.4 | France |
Name | Detection |
---|---|
http://identityAccept-EncodingTEIf-Modified-Sincetext/html;q=0.7 | |
http://www.microsoft.cR | |
http://microsoft.co | |
Click to see the 4 hidden entries | |
http://dinos.uni.me/file.php | |
http://yandex.com/bots) | |
http://%s/someRandomGen=%u&user.login=%u&us.pass=%u&email=%u&name=%u&id=%u&file=%u&someRandomGen=%u& | |
http://yandex.com/bots)Opera/9.80 |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_bad_module_info_d7276e448c8d28f2863f777566e3693183cdc5a3_85207d7d_128458a6\Report.wer |
Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4ABE.tmp.WERInternalMetadata.xml |
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D4F.tmp.xml |
XML 1.0 document, ASCII text, with CRLF line terminators | # | |
Click to see the 2 hidden entries | |||
C:\Users\user\AppData\Local\Temp\WER3AEE.tmp.WERDataCollectionStatus.txt |
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators | # | |
C:\Users\user\Desktop\gmon.out |
data | # |