Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 100
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
IP | Country | Detection |
---|---|---|
79.134.225.118 | Switzerland | |
162.159.130.233 | United States | |
162.159.135.233 | United States |
Name | IP | Detection |
---|---|---|
site.ptbagasps.co.id | 79.134.225.118 | |
asf-ris-prod-neurope.northeurope.cloudapp.azure.com | 168.63.67.155 | |
cdn.discordapp.com | 162.159.130.233 |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_ieinstal.exe_d9d38a5040f7bc4d337939808b7f7af62ecdfd_c0f1faba_19b2c7c3\Report.wer |
Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Inihsec.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER91DE.tmp.dmp |
Mini DuMP crash report, 14 streams, Fri Aug 7 13:06:48 2020, 0x1205a4 type | # | |
Click to see the 6 hidden entries | |||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D97.tmp.WERInternalMetadata.xml |
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA1EE.tmp.xml |
XML 1.0 document, ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Inih.url |
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\\Users\\user\\AppData\\Local\\Inihsec.exe>), ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\PO-0571[1] |
ASCII text, with very long lines, with no line terminators | # | |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\PO-0571[1] |
ASCII text, with very long lines, with no line terminators | # | |
C:\Users\user\AppData\Roaming\winos\logs.dat |
data | # |