Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 3, 2021, 9:11 a.m. | Sept. 3, 2021, 9:24 a.m. |
-
install_cleo_files.exe "C:\Users\test22\AppData\Local\Temp\install_cleo_files.exe"
2024
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
section | .didat |
resource name | PNG |
file | C:\Program Files (x86)\GOS Helper\SyncWithGame\vorbisFile.dll |
file | C:\Program Files (x86)\GOS Helper\SyncWithGame\vorbisHooked.dll |
file | C:\Program Files (x86)\GOS Helper\SyncWithGame\bass.dll |
section | {u'size_of_data': u'0x0000e200', u'virtual_address': u'0x00062000', u'entropy': 6.803520104006301, u'name': u'.rsrc', u'virtual_size': u'0x0000e020'} | entropy | 6.80352010401 | description | A section with a high entropy has been found |
Bkav | W32.AIDetect.malware2 |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
FireEye | Generic.mg.925dab9ac5bb0cdf |
Cybereason | malicious.159531 |
APEX | Malicious |
Sophos | Generic ML PUA (PUA) |
McAfee-GW-Edition | BehavesLike.Win32.Generic.jc |
Emsisoft | Trojan.Agent (A) |
McAfee | Artemis!925DAB9AC5BB |
Malwarebytes | Malware.AI.4240257092 |
Zoner | Probably Heur.ExeHeaderH |
eGambit | Unsafe.AI_Score_77% |
MaxSecure | Win.MxResIcn.Heur.Gen |