Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
Score: 88
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
|
|
malicious
Score: 100
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass
|
Name | IP | Detection |
---|---|---|
service-domain.xyz | 3.80.150.121 | |
clients.l.google.com | 142.250.203.110 | |
clients2.google.com | 0.0.0.0 |
Name | Detection |
---|---|
http://nuget.org/NuGet.exe | |
http://www.apache.org/licenses/LICENSE-2.0 | |
http://pesterbdd.com/images/Pester.png | |
Click to see the 12 hidden entries | |
https://go.microsoft.co | |
http://www.apache.org/licenses/LICENSE-2.0.html | |
https://contoso.com/ | |
https://nuget.org/nuget.exe | |
https://contoso.com/License | |
https://contoso.com/Icon | |
https://oneget.orgX | |
https://oneget.orgformat.ps1xmlagement.dll2040.missionsand | |
http://crl.micr | |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | |
https://github.com/Pester/Pester | |
https://oneget.org |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Temp\7zS2607.tmp\Install.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\7zS2D0C.tmp\Install.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pdyDoIJ.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
Click to see the 12 hidden entries | |||
C:\Windows\System32\GroupPolicy\gpt.ini |
ASCII text | # | |
C:\Windows\Temp\aoRCsjFoxFbwPJxK\MeXzroudxpEgwUW\RFYnzaH.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive |
data | # | |
C:\Users\user\AppData\Local\Temp\7zS2607.tmp\__data__\config.txt |
data | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ambua3bc.cdi.ps1 |
very short file (no magic) | # | |
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctvry2t3.t3r.psm1 |
very short file (no magic) | # | |
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive |
data | # | |
C:\Windows\System32\GroupPolicy\Machine\Registry.pol |
RAGE Package Format (RPF), | # | |
C:\Windows\Tasks\bbsSMGQQDZvgelOgpL.job |
data | # | |
C:\Windows\Temp\__PSScriptPolicyTest_22rgx3dy.2p3.psm1 |
very short file (no magic) | # | |
C:\Windows\Temp\__PSScriptPolicyTest_umumzqbx.1yl.ps1 |
very short file (no magic) | # | |
\Device\ConDrv |
ASCII text, with CRLF, CR line terminators | # |