Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
Score: 100
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
IP | Country | Detection |
---|---|---|
162.159.130.233 | United States |
Name | IP | Detection |
---|---|---|
cdn.discordapp.com | 162.159.130.233 | |
ahmed2611.linkpc.net | 0.0.0.0 |
Name | Detection |
---|---|
https://go.micro | |
https://github.com/Pester/Pester | |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | |
Click to see the 15 hidden entries | |
http://csoft.com/pki/crls/MicRooCerAut_2 | |
https://contoso.com/Icon | |
https://contoso.com/License | |
https://nuget.org/nuget.exe | |
https://contoso.com/ | |
http://schemas.xmlsoap.org/wsdl/ | |
http://nuget.org/NuGet.exe | |
http://crl.microsof | |
http://www.apache.org/licenses/LICENSE-2.0.html | |
ahmed2611.linkpc.net | |
http://schemas.xmlsoap.org/soap/encoding/ | |
http://pesterbdd.com/images/Pester.png | |
https://cdn.discordapp.com/attachments/833416270924742669/869658503759937606/dola2021.txt | |
https://cdn.discordapp.comx | |
https://cdn.discordapp.com/attachments/833416270924742669/869658269294137374/dola2020.txt |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\Documents\20210803\PowerShell_transcript.019635.jcVtHXYn.20210803225606.txt |
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators | # | |
C:\Users\Public\Run\Run.vbs |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache |
data | # | |
Click to see the 3 hidden entries | |||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive |
data | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evfblz0q.2mw.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ttgqezgt.k4l.ps1 |
very short file (no magic) | # |