Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 11, 2025, 1:42 p.m. | April 11, 2025, 1:44 p.m. |
-
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\csrss.exe"
2156
-
-
-
firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
2768
-
Suricata Alerts
Suricata TLS
No Suricata TLS
request | POST http://www.worrr37.yachts/1imc/ |
request | GET http://www.worrr37.yachts/1imc/?xMeGPpI=GkZ+7lZN5ZbT6rZAkp7cmEqKOumTFqiR2eAXidPe90Y9rybDHdv8WEO3bqVeNbApXiU349333fnXtngssFNkiuaTeAutzCI3gCL6zAngbJ7QtBnn/nQUnSrlmVSOL2qjs5+ApuY=&kl7yj=dC4o4 |
request | GET http://www.sqlite.org/2017/sqlite-dll-win32-x86-3200000.zip |
request | GET http://www.sqlite.org/2016/sqlite-dll-win32-x86-3110000.zip |
request | GET http://www.sqlite.org/2019/sqlite-dll-win32-x86-3300000.zip |
request | GET http://www.sqlite.org/2022/sqlite-dll-win32-x86-3380000.zip |
request | POST http://www.soportemx-findmy.click/ma0g/ |
request | GET http://www.soportemx-findmy.click/ma0g/?xMeGPpI=H2S90RmziCMvLCuKzCWRDlD3y3BtNHnT+UjWuF5QkK5TSoHa4lhKfuVBBY/xZDIxlQkHSEeXC/2MO32woOoJhNRwlvINmE2f4iVb+1X59xwMoslpnGs7ObjFC0D//e/oO9N1DbU=&kl7yj=dC4o4 |
request | POST http://www.vczuahand.xyz/lvz4/ |
request | GET http://www.vczuahand.xyz/lvz4/?xMeGPpI=Xs1PCb/MaYPIPAxC7BfyCKw16Qgph55MCQOIGo7Nl8rFa4QZz+K5W1hPLI1607tRp9GgCJ7X+mzA4XqXnNSoEuvlRvhKlR8DhXdkfyq/HZqiPbu8fNkzPsjR0Pgy51mK7LA9YuI=&kl7yj=dC4o4 |
request | POST http://www.855696a.xyz/q86a/ |
request | GET http://www.855696a.xyz/q86a/?xMeGPpI=1RS/DLESjC/mKKX8IPepHWQ88RxDP1aCo7MGFq+OZJ2Pg2HsdXdlT2xsvmE392eXqb9P0SMm051Cq8Esu/QKUYNbRkYSrCwvHfCGfAn42Vd7BejAa9lxaTExsZlL8Og3FAv4dqc=&kl7yj=dC4o4 |
request | POST http://www.headset2.online/pl23/ |
request | GET http://www.headset2.online/pl23/?xMeGPpI=pwQm/8Nry++CWhwQEObW40wjaH0cvm6b9cWiDzs/wKG7gU2SU1fIKPFVOtmRZIK9fJNQxDIjM5M/HYIVgiqppyTz/0XbM+5YC9JKCqzZT3SFByiwC2iSKSo+zn41b6GRTqaovhk=&kl7yj=dC4o4 |
request | POST http://www.futureedge.website/q4wg/ |
request | GET http://www.futureedge.website/q4wg/?xMeGPpI=WxORhD4RgEO5uNW1zIvuiuM1wajJmVXJQFKGj9LBFcZ0l1e50YnvAr5T8EMlczPx1w+PQtVZROcXWrB4KjCnqEQodoFuB1y/PM5JW3yzs/PmL9usaRgWCdLb7/N0LcsSR6JchHM=&kl7yj=dC4o4 |
request | POST http://www.meshki-co-uk.shop/b8n0/ |
request | GET http://www.meshki-co-uk.shop/b8n0/?xMeGPpI=kyUzpDR/GXT4UV/+oaqkBHt9bALONeN1bnrOTHFLjUDm6VF6u4qvS3uMxxy331Wg+HkFQKVB7+znMoBnkIjZtMdr1+qAAoS2YWCZ61uYKrqWWVNAfLrW3BVA1sijRC7j/YuRgN0=&kl7yj=dC4o4 |
request | POST http://www.worrr37.yachts/1imc/ |
request | POST http://www.soportemx-findmy.click/ma0g/ |
request | POST http://www.vczuahand.xyz/lvz4/ |
request | POST http://www.855696a.xyz/q86a/ |
request | POST http://www.headset2.online/pl23/ |
request | POST http://www.futureedge.website/q4wg/ |
request | POST http://www.meshki-co-uk.shop/b8n0/ |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ |
section | {u'size_of_data': u'0x00055200', u'virtual_address': u'0x000c7000', u'entropy': 7.882929345827478, u'name': u'.rsrc', u'virtual_size': u'0x000550fc'} | entropy | 7.88292934583 | description | A section with a high entropy has been found | |||||||||
entropy | 0.298291721419 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.AutoIt.l!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | cld.trojanspy.noon |
Skyhigh | BehavesLike.Win32.Formbook.tc |
ALYac | Trojan.GenericKD.76203073 |
Cylance | Unsafe |
Sangfor | Virus.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.GenericKD.76203073 |
K7GW | Trojan ( 005c554a1 ) |
K7AntiVirus | Trojan ( 005c554a1 ) |
Arcabit | Trojan.Generic.D48AC441 |
VirIT | Trojan.Win32.AutoIt_Heur.L |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.Autoit.GZD |
APEX | Malicious |
Avast | Win32:Malware-gen |
Kaspersky | Trojan-Spy.Win32.Noon.bkxf |
Alibaba | Trojan:Win32/Strab.5002d23f |
MicroWorld-eScan | Trojan.GenericKD.76203073 |
Emsisoft | Trojan.GenericKD.76203073 (B) |
F-Secure | Trojan.TR/AD.Swotter.xryzp |
McAfeeD | ti!D98ECF3BDFC1 |
CTX | exe.trojan.autoit |
Sophos | Mal/Generic-S |
Detected | |
Avira | TR/AD.Swotter.xryzp |
Kingsoft | malware.kb.a.779 |
Microsoft | Trojan:Win32/Strab!rfn |
GData | Win32.Trojan.Agent.P8NDAE |
Varist | W32/AutoIt.OL.gen!Eldorado |
AhnLab-V3 | Trojan/AU3.Loader.S3020 |
McAfee | Artemis!67E4A0DC097E |
Malwarebytes | Backdoor.NetWiredRC.AutoIt.Generic |
Ikarus | Trojan.Autoit |
Zoner | Trojan.Win32.179540 |
TrendMicro-HouseCall | TROJ_GEN.R002H01D925 |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | AutoIt/Agent.GYU!tr |
AVG | Win32:Malware-gen |