Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
Score: 100
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
Name | Detection |
---|---|
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/ | |
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/ | |
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= | |
Click to see the 49 hidden entries | |
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0# | |
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? | |
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s | |
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= | |
https://%s.xboxlive.com | |
https://dev.virtualearth.net/REST/v1/Locations | |
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= | |
https://dev.virtualearth.net/mapcontrol/logging.ashx | |
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t | |
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= | |
https://dev.virtualearth.net/REST/v1/Routes/ | |
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y | |
https://dynamic.t | |
http://crl.sectigo.com/SectigoPub | |
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# | |
https://dev.virtualearth.net/REST/v1/Routes/Transit | |
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen | |
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= | |
https://activity.windows.com | |
https://dev.ditu.live.com/REST/v1/Locations | |
https://%s.dnet.xboxlive.com | |
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/ | |
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= | |
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry= | |
http://ocsp.sectigo.com0 | |
https://dev.ditu.live.com/REST/v1/Routes/ | |
https://dev.virtualearth.net/REST/v1/Routes/Driving | |
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx | |
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/ | |
https://t0.tiles.ditu.live.com/tiles/gen | |
https://dev.virtualearth.net/REST/v1/Routes/Walking | |
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# | |
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= | |
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0# | |
https://dev.ditu.live.com/mapcontrol/logging.ashx | |
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ | |
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 | |
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= | |
https://dev.virtualearth.net/REST/v1/Transit/Schedules/ | |
https://sectigo.com/CPS0C | |
https://sectigo.com/CPS0D | |
https://appexmapsappupdate.blob.core.windows.net | |
http://www.bingmapsportal.comsv | |
http://www.nirsoft.net/ | |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | |
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ | |
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx | |
https://sectigo.com/CPS0 | |
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\36C95A71.exe |
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | # | |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RYhdmjjr94.exe_89963238c73da7d78cda02a97e2a0a7dda8e9bf_d37fc9e5_188fe961\Report.wer |
Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\36C95A71.exe:Zone.Identifier |
ASCII text, with CRLF line terminators | # | |
Click to see the 53 hidden entries | |||
C:\Users\Public\Documents\2FDD6624\svchost.exe |
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | # | |
C:\Users\Public\Documents\2FDD6624\svchost.exe:Zone.Identifier |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\adcc6271-e229-4005-bcb6-10475704cb95\AdvancedRun.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nfhky3a4.nkp.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yprbbuxu.tzk.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yaftruwr.5iy.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xsyzh3ek.kz4.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x3mj0yao.kun.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skw0nnic.ute.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skdig1ki.bhc.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rxbwq3x5.3vw.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qobie0yt.3py.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdaahtvp.wcr.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3nafo4w.jjh.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hpq1hxdx.5bu.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\adcc6271-e229-4005-bcb6-10475704cb95\test.bat |
ASCII text, with very long lines, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.4_2TT6xL.20210915085355.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.5Md4gwAb.20210915085436.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.65F6kbZc.20210915085351.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.7GV4I+P8.20210915085342.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.8wRRpIo6.20210915085354.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.M0A9nFrO.20210915085339.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.ZxpJrQlW.20210915085337.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.p8kQh6Fk.20210915085438.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.v0+taG7v.20210915085331.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Users\user\Documents\20210915\PowerShell_transcript.284992.vQHTUbYb.20210915085333.txt |
UTF-8 Unicode (with BOM) text, with CRLF line terminators | # | |
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp |
ASCII text, with no line terminators | # | |
C:\Users\user\AppData\Local\Temp\4a22a6d0-4aef-43ec-af0a-4fbe1184937f\test.bat |
ASCII text, with very long lines, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db |
Extensible storage engine DataBase, version 0x620, checksum 0xbb689bbd, page size 16384, DirtyShutdown, Windows version 10.0 | # | |
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm |
data | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC994.tmp.dmp |
Mini DuMP crash report, 14 streams, Wed Sep 15 15:54:26 2021, 0x1205a4 type | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD83B.tmp.WERInternalMetadata.xml |
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD994.tmp.xml |
XML 1.0 document, ASCII text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD9B1.tmp.csv |
data | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE124.tmp.txt |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive |
data | # | |
C:\Users\user\AppData\Local\Temp\36029300-7d61-41e1-9521-12c4a6ab3f8e\AdvancedRun.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\36029300-7d61-41e1-9521-12c4a6ab3f8e\test.bat |
ASCII text, with very long lines, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\4a22a6d0-4aef-43ec-af0a-4fbe1184937f\AdvancedRun.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_julunsxd.nk1.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\866838ff-f925-41f4-be86-0619ea100a91\AdvancedRun.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\866838ff-f925-41f4-be86-0619ea100a91\test.bat |
ASCII text, with very long lines, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\9de20bc9-aa79-424f-aee4-da91bc757ec8\AdvancedRun.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\9de20bc9-aa79-424f-aee4-da91bc757ec8\test.bat |
ASCII text, with very long lines, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1lspoaje.tcq.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3255sxic.got.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5hvfzt5y.uov.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5stcexqa.mjh.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dci5vt12.o2u.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eiuvcs12.lov.psm1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h00p3kfi.mal.psm1 |
very short file (no magic) | # | |
C:\ProgramData\Microsoft\Network\Downloader\edb.log |
data | # |