Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 100
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
IP | Country | Detection |
---|---|---|
167.114.220.88 | Canada |
Name | IP | Detection |
---|---|---|
flsrnidth.com | 167.114.220.88 | |
mail.flsrnidth.com | 0.0.0.0 | |
g.msn.com | 0.0.0.0 |
Name | Detection |
---|---|
https://AXtxDU5WDMRP39.com | |
http://ocsp.int-x3.letsencrypR | |
http://crl.m | |
Click to see the 7 hidden entries | |
http://cps.letsencrypt.org0 | |
http://cert.int-x3.letsencrypt.org/0 | |
http://cert.int-x3.leO | |
http://ocsp.int-x3.letsencrypt.org0/ | |
http://cps.root-x1.letsencrypt.org0 | |
http://flsrnidth.com | |
http://mail.flsrnidth.com |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW RFQ.exe.log |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Roaming\YYtJku\YYtJku.exe |
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | # | |
C:\Users\user\AppData\Roaming\YYtJku\YYtJku.exe:Zone.Identifier |
ASCII text, with CRLF line terminators | # | |
Click to see the 1 hidden entries | |||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YYtJku.exe.log |
ASCII text, with CRLF line terminators | # |