Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 100
|
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
|
IP | Country | Detection |
---|---|---|
95.216.94.72 | Germany | |
149.154.167.220 | United Kingdom |
Name | IP | Detection |
---|---|---|
milkhost.ru | 95.216.94.72 | |
api.telegram.org | 149.154.167.220 |
Name | Detection |
---|---|
http://milkhost.ru/trasper/goshcj.exe | |
https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocumentdocument----- | |
http://crl.entrust.net/2048ca.crl0 | |
Click to see the 21 hidden entries | |
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip | |
https://secure.comodo.com/CPS0 | |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | |
http://ocsp.entrust.net0D | |
http://api.telegram.org | |
http://www.diginotar.nl/cps/pkioverheid0 | |
http://www.%s.comPA | |
https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocument | |
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0 | |
https://api.telegram.orgP | |
http://127.0.0.1:HTTP/1.1 | |
http://mZWVLr.com | |
http://ocsp.entrust.net03 | |
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha | |
http://crl.entrust.net/server1.crl0 | |
https://api.telegram.org | |
https://4hCltxiPdhpdC.com | |
https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/ | |
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. | |
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0 | |
http://DynDns.comDynDNS |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\goshcj[1].exe |
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | # | |
C:\Users\user\AppData\Roaming\godsawqop.exe |
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0008E59B-A89A-4382-AC7E-24705A8EB889}.tmp |
data | # | |
Click to see the 6 hidden entries | |||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{773917BE-1BC4-4D2D-91B8-39B324F718F3}.tmp |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7764CFCD-FF48-436A-A353-8D268E618EA5}.tmp |
data | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO141021.LNK |
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:55 2021, mtime=Mon Aug 30 20:08:55 2021, atime=Thu Oct 14 16:35:13 2021, length=104541, window=hide | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm |
data | # | |
C:\Users\user\Desktop\~$141021.doc |
data | # |