Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 100
|
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
|
IP | Country | Detection |
---|---|---|
45.132.226.1 | Netherlands | |
43.245.183.172 | Indonesia |
Name | IP | Detection |
---|---|---|
lutanedukasi.co.id | 43.245.183.172 | |
stonecold.ddns.net | 45.132.226.1 |
Name | Detection |
---|---|
http://lutanedukasi.co.id/wp-includes/jnstp.exej | |
http://lutanedukasi.co.id/wp-includes/jnstp.exe | |
http://lutanedukasi.co.id/wp-includes/jnstp.exejjC: | |
Click to see the 4 hidden entries | |
http://lutanedukasi.co.id/wp-includes/jnstp.exeC: | |
http://lutanedukasi.co.id/wp-includes/jnstp.exeT | |
stonecold.ddns.net | |
http://nsis.sf.net/NSIS_ErrorError |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\jnstp[1].exe |
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{E418C216-F903-4F08-9D65-89DE9868688C}.tmp |
Composite Document File V2 Document, Cannot read section info | # | |
C:\Users\user\AppData\Local\Temp\jqenyeo.exe |
PE32 executable (console) Intel 80386, for MS Windows | # | |
Click to see the 12 hidden entries | |||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat |
ISO-8859 text, with no line terminators | # | |
C:\Users\user\AppData\Roaming\dll.exe |
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive | # | |
C:\Users\user\AppData\Roaming\mtmgxghqo\ltqmdmdi.exe |
PE32 executable (console) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{70D846B3-DCAC-4A39-983B-1268AFAC60AA}.tmp |
data | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BD369796-5E3E-4B27-9B02-9FE798ADC5FC}.tmp |
data | # | |
C:\Users\user\AppData\Local\Temp\hjmxlwxk |
data | # | |
C:\Users\user\AppData\Local\Temp\lcjspmd3kk4i8bc40b |
data | # | |
C:\Users\user\AppData\Local\Temp\nsb484E.tmp |
data | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Payslip_APR_2022.LNK |
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Tue May 17 04:07:13 2022, length=4697, window=hide | # | |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm |
data | # | |
C:\Users\user\Desktop\~$yslip_APR_2022.doc |
data | # |