Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 69
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
Name | Detection |
---|---|
http://www.rjlsoftware.com/?screenscrewopenj | |
http://www.rjlsoftware.com/?screenscrew | |
http://www.autohotkey.com | |
Click to see the 3 hidden entries | |
http://www.autohotkey.comCould | |
http://www.rjlsoftware.com | |
http://www.rjlsoftware.com( |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Temp\1870.tmp\CLWCP.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\1870.tmp\PayloadGDI.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\1870.tmp\PayloadMBR.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
Click to see the 7 hidden entries | |||
C:\Users\user\AppData\Local\Temp\1870.tmp\corona.vbs |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\1870.tmp\covid.vbs |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\1870.tmp\covid21.vbs |
ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\1870.tmp\screenscrew.exe |
PE32 executable (GUI) Intel 80386, for MS Windows | # | |
C:\Users\user\AppData\Local\Temp\1870.tmp\covid.bmp |
PC bitmap, Windows 3.x format, 1920 x 1080 x 24 | # | |
C:\Users\user\AppData\Local\Temp\1870.tmp\covid21.bat |
DOS batch file, ASCII text, with CRLF line terminators | # | |
C:\covid21\covid.bmp |
PC bitmap, Windows 3.x format, 1920 x 1080 x 24 | # |