Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
Score: 100
|
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
|
IP | Country | Detection |
---|---|---|
67.199.248.11 | United States | |
5.79.72.163 | Netherlands |
Name | IP | Detection |
---|---|---|
bit.ly | 67.199.248.11 | |
teknik.io | 5.79.72.163 | |
onedrive.live.com | 0.0.0.0 | |
Click to see the 2 hidden entries | ||
cbzrfq.bl.files.1drv.com | 0.0.0.0 | |
u.teknik.io | 0.0.0.0 |
Name | Detection |
---|---|
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0 | |
https://u.teknik.io/PWua8.txt | |
https://onedrive.live.com/ | |
Click to see the 18 hidden entries | |
http://crl.entrust.net/2048ca.crl0 | |
https://secure.comodo.com/CPS0 | |
http://ocsp.entrust.net0D | |
https://cbzrfq.bl.files.1drv.com/D | |
https://cbzrfq.bl.files.1drv.com/ | |
http://www.diginotar.nl/cps/pkioverheid0 | |
http://www.%s.comPA | |
https://api.ipify.org%GETMozilla/5.0 | |
http://127.0.0.1:HTTP/1.1 | |
https://onedrive.live.com/download?cid=F57CEB019EB26E7D&resid=F57CEB019EB26E7D%21108&authkey=AN1oxHG | |
http://ocsp.entrust.net03 | |
http://JSQBKI.com | |
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha | |
http://crl.entrust.net/server1.crl0 | |
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. | |
http://bit.ly/3qO7045 | |
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0 | |
http://DynDns.comDynDNS |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\Public\69577.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PWua8[1].txt |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\Cab78C9.tmp |
Microsoft Cabinet archive data, 59134 bytes, 1 file | # | |
Click to see the 16 hidden entries | |||
C:\Users\user\Desktop\~$rchase order_2242021.doc |
data | # | |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\JOHDAECH.txt |
ASCII text | # | |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\HDGNLTQS.txt |
ASCII text | # | |
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex |
Little-endian UTF-16 Unicode text, with no line terminators | # | |
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm |
data | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\purchase order_2242021.LNK |
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:18 2020, mtime=Wed Aug 26 14:08:18 2020, atime=Wed Feb 24 20:06:36 2021, length=1797651, window=hide | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\Tar78CA.tmp |
data | # | |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 |
Microsoft Cabinet archive data, 59134 bytes, 1 file | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6618253-1CF8-4E74-AA78-05F4F57053A0}.tmp |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9A867ADF-3614-4635-BFBB-6C9AC8D8FC42}.tmp |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{96CDA2CA-B597-4160-9AA2-9325CEFB4D67}.tmp |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\3qO7045[1].htm |
HTML document, ASCII text | # | |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A |
data | # | |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 |
data | # | |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A |
data | # |