Template File C:Userswin7AppDataLocalWinTempis-EU83C.tmp_isetup_shfoldr.dll.
The analysis extracted a file that was identified as malicious. Template File "C:Userswin7AppDataLocalWinTempis-EU83C.tmp_isetup_shfoldr.dll".
iSARC detected suspicious file wintemp.tmp . The analysis extracted a file that was identified as malicious.
MSHTML:Document.Save(@"C:Userswin7AppDataLocalTempwin.tmp.txt", @"text/plain")
MSHTML:Document.Save(@"C:Userswin7AppDataLocalTempwin.tmp.txt", @"text/plain")
MSHTML:Document.Save(@"C:Userswin7AppDataLocalTempwin.tmp.txt", @"text/plain")
MSHTML:Document.Save(@"C:Userswin7AppDataLocalTempwin.tmp.txt", @"text/plain")
The analysis extracted a file that was identified as malicious. "MSHTML:Document.Save(@"C:Userswin7AppDataLocalTempwin.tmp.txt", @"text/plain")".
MSHTML:Document.Save(@"C:Userswin7AppDataLocalTempwin.tmp.txt", @"text/plain")
"iSARC" detected suspicious file wintemp.tmp . The analysis extracted a file that was identified as malicious.
MSHTML:Document.Save(@"C:Userswin7AppDataLocalTempwin.tmp.txt", @"text/plain")
"win.tmp" wrote 16,000 bytes starting with PE header signature to file "%TEMP%is-G3AMN.tmpCallbackCtrl.dll": .
The analysis extracted a file that was identified as malicious. "win.tmp" wrote 16,000 bytes starting with PE header signature to file "%TEMP%is-G3AMN.tmpCallbackCtrl.dll".
The analysis extracted a file that was identified as malicious. "win.tmp" wrote 16,000 bytes starting with PE header signature to file "%TEMP%is-G3AMN.tmpCallbackCtrl.dll".
"win.tmp" wrote 16,000 bytes starting with PE header signature to file "%TEMP%is-G3AMN.tmpCallbackCtrl.dll": .
The be359ba680
Related links:
Yorumlar