Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 21, 2025, 9:11 a.m. | March 21, 2025, 9:14 a.m. |
-
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\vsse.exe"
2104
-
-
-
firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
2676
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
request | POST http://www.temecula.deals/xwqx/ |
request | GET http://www.temecula.deals/xwqx/?y_3TV=otmcxnJvFIgVfYDZKBmMxfZ/2Rsfmh5K0YH/99vZ/T7EZjaL7WFZ4hVKC4Doi6q8u50oMvgcqXDIzwm5VvCgIECKPmoYjETr5j8UxgstLIDPhmq1nsbeJqpfQc3YQdHA6Li+eys=&NReKM=nmUcOK |
request | GET http://www.sqlite.org/2018/sqlite-dll-win32-x86-3260000.zip |
request | POST http://www.agistaking.xyz/c8u0/ |
request | GET http://www.agistaking.xyz/c8u0/?y_3TV=FMJVgFO6r2fqsFEl6TwcqloBaxOFxcVuwnCszuFGPNY4Pf96ze7CheFJaWHnvvI5HUXX1ffPrMdMHGblvRY36kwJ6Z5LjOSq3+UxRnzl3DcT41eA43jrjNZY+mEu3ZZesfo5R+c=&NReKM=nmUcOK |
request | POST http://www.anartisthuman.info/q5nb/ |
request | GET http://www.anartisthuman.info/q5nb/?y_3TV=cbGNT1GwMlz4ZJSziaGZ417O1lPEEGr/otaQaC2lDUNXgkD5XcZBfcFh4bos8p6nBAeLwaWY70PtJ84F2cqIefn38VmVolqA9OM00NydnH4eimiA5ovgMJtFZSZXN9c5ALcOmvE=&NReKM=nmUcOK |
request | POST http://www.zeniow.xyz/ia4f/ |
request | GET http://www.zeniow.xyz/ia4f/?y_3TV=PWKr0tq9ggEA6355c9UyNF2pd7P8mK2dL3BBPgf/WfBkZg8pHvux8cwM5cbL82+ryc47uajX6FH7VUY9gkG/3EWTphbi/Pfl4NQpMu/zjtwuhefdlRmz0+cWQnJKIaegbhRgrPA=&NReKM=nmUcOK |
request | POST http://www.multo.xyz/dlol/ |
request | GET http://www.multo.xyz/dlol/?y_3TV=Vdu1QfmsuFO68GL+Z4x3EHJHVjGIjNF/HVgaJhop4EyQK8uQubyUDtwdOyyNKnabI4xwGbdZuUIxD/VQQoafkwH5Ac9mLu9zmIIuvlxOoy49VxHnP5G+j0sNpXUeFDu2oIGBsSQ=&NReKM=nmUcOK |
request | POST http://www.pond-magic.shop/vhzb/ |
request | GET http://www.pond-magic.shop/vhzb/?y_3TV=utPv65Al4AswLtqgXBb6Y4fTxryMVttJesMXOpbeQKe44HKKs52WpuXeGiT/ACGN6+bMff3De6fwTiZsaGhnqx8sLpUZ6NMur+BKLZ/qQcXmCUHZhzver/1jMPQf6ei06+vySQk=&NReKM=nmUcOK |
request | POST http://www.needethereum.xyz/7t1k/ |
request | GET http://www.needethereum.xyz/7t1k/?y_3TV=FU89ini0gnpj8wdpORJLv3Vt4RH2UdonDWusiqXcZKGzkaK/1F4v6ebYfxiMRK0Sp+KhdTnnXUlQw/F9hhoAQLNA+2u62uYZ6Z5FgcXKgYvRqi64dxV4oyAUMmVAbniMH2jLJf0=&NReKM=nmUcOK |
request | POST http://www.vaishnavi.xyz/fepe/ |
request | POST http://www.temecula.deals/xwqx/ |
request | POST http://www.agistaking.xyz/c8u0/ |
request | POST http://www.anartisthuman.info/q5nb/ |
request | POST http://www.zeniow.xyz/ia4f/ |
request | POST http://www.multo.xyz/dlol/ |
request | POST http://www.pond-magic.shop/vhzb/ |
request | POST http://www.needethereum.xyz/7t1k/ |
request | POST http://www.vaishnavi.xyz/fepe/ |
description | calc.exe tried to sleep 162 seconds, actually delayed analysis time by 162 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ |
file | C:\Users\test22\AppData\Local\Chromium\User Data |
file | C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data |
file | C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
section | {u'size_of_data': u'0x0005a200', u'virtual_address': u'0x000c7000', u'entropy': 7.892922674490383, u'name': u'.rsrc', u'virtual_size': u'0x0005a1d0'} | entropy | 7.89292267449 | description | A section with a high entropy has been found | |||||||||
entropy | 0.310374515712 | description | Overall entropy of this PE file is high |
file | C:\Users\test22\AppData\Local\AVAST Software\Browser\User Data |
file | C:\Users\test22\AppData\Local\AVG\Browser\User Data |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.AutoIt.4!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | TrojanPWS.AutoIt.Zbot.S |
Skyhigh | BehavesLike.Win32.Formbook.tc |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.76102101 |
Sangfor | Virus.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.GenericKD.76102101 |
K7GW | Trojan ( 005850dc1 ) |
K7AntiVirus | Trojan ( 005850dc1 ) |
Arcabit | Trojan.Generic.D48939D5 |
VirIT | Trojan.Win32.AutoIt_Heur.L |
Symantec | Trojan.Malautoit!g7 |
Elastic | malicious (high confidence) |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Avast | Script:SNH-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Script/Injector.01e15826 |
MicroWorld-eScan | Trojan.GenericKD.76102101 |
Rising | Trojan.Injector/Autoit!1.1294D (CLASSIC) |
Emsisoft | Trojan.GenericKD.76102101 (B) |
F-Secure | Trojan.TR/AD.Swotter.vqxwr |
DrWeb | Trojan.AutoIt.1626 |
TrendMicro | TROJ_GEN.R002C0DCJ25 |
McAfeeD | ti!75F5E2469A72 |
CTX | exe.trojan.autoit |
Sophos | Troj/AutoIt-DHB |
FireEye | Trojan.GenericKD.76102101 |
Detected | |
Avira | TR/AD.Swotter.vqxwr |
Antiy-AVL | Trojan/Generic.ASMalwFI.6EB0F |
Gridinsoft | Ransom.Win32.Zbot.sa |
Microsoft | Trojan:Win32/Formbook!rfn |
ZoneAlarm | Troj/AutoIt-DHB |
GData | Trojan.GenericKD.76102101 |
Varist | W32/AutoIt.OL.gen!Eldorado |
AhnLab-V3 | Trojan/AU3.Loader.S2970 |
McAfee | Artemis!CD00EAB486D2 |
DeepInstinct | MALICIOUS |
Ikarus | Trojan.Autoit |
Zoner | Trojan.Win32.179540 |
TrendMicro-HouseCall | TROJ_GEN.R002C0DCJ25 |
Tencent | Script.Trojan.Generic.Nqil |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | AutoIt/Injector.GKX!tr |
AVG | Script:SNH-gen [Trj] |
Paloalto | generic.ml |