Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 72
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
|
|
malicious
Score: 72
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass
|
IP | Country | Detection |
---|---|---|
1.2.7.21 | China |
Name | Detection |
---|---|
https://http://%u.%u.%u.%u:%uGETPOSTGetProcAddressLoadLibraryA0928394074595794809dslffsdfsdfggM | |
https://onlineeast#.bankofamerica.com/cgi-bin/ias/ |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_zeus 1_1.2.7.21._f2d2d9cac6410604b7444912c84a53b95e12c6_4cc65dff_0df678e9\Report.wer |
Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6438.tmp.dmp |
Mini DuMP crash report, 14 streams, Mon Jul 20 07:55:14 2020, 0x1205a4 type | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER702F.tmp.WERInternalMetadata.xml |
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
Click to see the 2 hidden entries | |||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70EC.tmp.xml |
XML 1.0 document, ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\deprecated.cookie |
ASCII text, with no line terminators | # |