Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 64
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
|
|
malicious
Score: 72
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass
|
Name | Detection |
---|---|
http://nsis.sf.net/NSIS_Error | |
http://nsis.sf.net/NSIS_ErrorError |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Temp\ir9ehshgyir.dll |
PE32 executable (DLL) (console) Intel 80386, for MS Windows | # | |
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Invoice 6500TH21_a95a9cdbd3868a56584b72cabf593f6f9eaa3187_00d3adf0_1b973ea4\Report.wer |
Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER231D.tmp.dmp |
Mini DuMP crash report, 14 streams, Mon Feb 22 19:19:39 2021, 0x1205a4 type | # | |
Click to see the 4 hidden entries | |||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AEE.tmp.WERInternalMetadata.xml |
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2CA5.tmp.xml |
XML 1.0 document, ASCII text, with CRLF line terminators | # | |
C:\Users\user\AppData\Local\Temp\csnalztt.zl |
data | # | |
C:\Users\user\AppData\Local\Temp\nsb112C.tmp\System.dll |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows | # |