GridinSoft Threat Intelligence

nsvD71C.tmp file report

Clean record File reputation report
MD5 0e37fbfa79d349d672456923ec5fbbe3
Latest seen 2026-04-28 23:01:25 (2 weeks ago)
First seen 2017-05-21 03:01:53 (8 years ago)
Size 755 KB

Why it matters

Evidence available for this file

Detection

Latest status is clean for this hash.

Timeline

First seen 2017-05-21 03:01:53 (8 years ago); latest analysis 2026-04-28 23:01:25 (2 weeks ago).

Publisher context

Company metadata: Microsoft Corporation. Product metadata: Microsoft® Visual Studio® 2010.

Digital signature

Signed by Microsoft Corporation. The signature is reported as valid, but signed files can still be bundled or abused.

Aliases

This hash has appeared under multiple file names, which can happen with repackaging, bundling, or deliberate renaming.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Confirm the hash and publisher match the expected software.
  2. Review the observed locations and signature information below.
  3. Rescan if the file was downloaded from an unknown source or appears in an unusual path.

nsvD71C.tmp is a Windows file recorded in the ThreatInfo database. It is associated with Microsoft® Visual Studio® 2010. The reported company name is Microsoft Corporation. The current detection status is Clean, based on the latest analysis from 2026-04-28 23:01:25 (2 weeks ago).

This record is currently marked as clean, but file reputation can depend on the exact path, hash, and source. Compare the MD5 and publisher data below with the file on your system.

Product Name: Microsoft® Visual Studio® 2010
Company Name: Microsoft Corporation
MD5: 0e37fbfa79d349d672456923ec5fbbe3
Size: 755 KB
First Published: 2017-05-21 03:01:53 (8 years ago)
Latest Published: 2026-04-28 23:01:25 (2 weeks ago)
Status: Clean (on last analysis)
Analysis Date: 2026-04-28 23:01:25 (2 weeks ago)
Signed By: Microsoft Corporation
Status: Valid

The signature on nsvD71C.tmp is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\pandora.tv\panservice
%programfiles%\genie soft\genie wifi
%programfiles%\genie soft\genie cleaner
%appdata%\tencent\androidserver\1.0.0.492
%programfiles%\thinksky\itools 3
%appdata%\tencent\androidserver\1.0.0.510
%appdata%\tencent\androidserver\1.0.0.485
%programfiles%\drivertoolkit
%programfiles%\vupiyntaied
%appdata%\tencent\androidserver\1.0.0.514

ThreatInfo has observed nsvD71C.tmp in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

msvcr100.dll nsh55CD.tmp nso7694.tmp nst9FD8.tmp nsc821.tmp nsi4DA8.tmp nsa82E9.tmp nsaE772.tmp nsmC236.tmp nse2009.tmp nsbD982.tmp nsr27E6.tmp nsm4CCB.tmp nsl70B1.tmp nsl9F4.tmp nsa4348.tmp nsq64ED.tmp msvcr100.dll.remove nsf9919.tmp nst2C.tmp nsl66A6.tmp nsr8732.tmp nsoADF3.tmp nsu801B.tmp nsy77B7.tmp nsz6443.tmp nshC230.tmp nsn32F6.tmp nsk9DD4.tmp nsnA27E.tmp nsf4F09.tmp nstE506.tmp nso7BD.tmp nsg398F.tmp nshF3EF.tmp msvcr100.dll.old nsvD4B6.tmp nsaB60C.tmp nsg9C1C.tmp nsk186E.tmp nss94F5.tmp nsx4492.tmp nsf11C6.tmp nssCA35.tmp nsx1.tmp nsa3728.tmp nsz387.tmp nsv8171.tmp nsk421B.tmp nsuE048.tmp nskFE72.tmp nssC5D1.tmp nsh84A4.tmp nsb76A8.tmp nsg11EA.tmp nsg29C1.tmp nsw58BA.tmp nsu3044.tmp nsc371D.tmp nsh65F3.tmp nsz6367.tmp nsj2AFC.tmp nsmE94.tmp nsi8ED3.tmp nsnE4EF.tmp nspE592.tmp nsc4616.tmp nslFBE2.tmp nss2C26.tmp nsb42.tmp nst65AC.tmp nsnAAE2.tmp nst82F5.tmp nseB9F.tmp nsmC13F.tmp nsd6FF6.tmp nsq4C9F.tmp nsk6931.tmp nss2997.tmp nsj7FF0.tmp msvcr100.dll_del nsp6552.tmp nsx6DF2.tmp nsm1F72.tmp msvcr100.dll.quarantined nsr95EF.tmp nskA62F.tmp nsi521C.tmp nsxD32C.tmp nsaA2C6.tmp nsh8FD4.tmp nsrB2D5.tmp nsiBD98.tmp nsx8442.tmp nsvEA26.tmp nsk70BF.tmp nsm25FD.tmp nsoD384.tmp nsf99F2.tmp nsx7079.tmp nsa463F.tmp nsk2916.tmp nsjD7A0.tmp nsqC861.tmp nssEEB2.tmp nszD9CE.tmp nsa349D.tmp nsa7EA4.tmp nsaA81.tmp nsrF8F2.tmp nsaEEE9.tmp nsz2046.tmp nsh87BB.tmp nsh1376.tmp nsqF57F.tmp nsg3624.tmp nsu3F55.tmp nsiFB77.tmp nsi9F51.tmp nsyFBFE.tmp nsuC486.tmp nsj1372.tmp nsrA10.tmp nsmBECF.tmp nsjA9A2.tmp msvcr100.dll.DEL1.DEL nsh7DAB.tmp nsc488B.tmp nsl8121.tmp nsvA7C6.tmp nsl23F7.tmp nsk6684.tmp nsrA5EC.tmp nsqEF20.tmp aaf174.rbf 264f25.rbf 14be8721.rbf 7219d6d.rbf nsu3E01.tmp nsr71CF.tmp nsc638.tmp nsw3B1B.tmp nsj2028.tmp nsk6FAC.tmp nsk41A7.tmp msvcr100_IObitDel.dll nscC3BC.tmp nsi8425.tmp nsk1B99.tmp nsj1DDA.tmp nsk1DC0.tmp nsq77D5.tmp nsy74DF.tmp nsh7B1E.tmp nsh3CB3.tmp nsc1718.tmp nsi5D9E.tmp nspEE5A.tmp nsi111B.tmp nsm9CF3.tmp ~~erase-502946131-8212-47813.$$$ nszD246.tmp nsuE2A.tmp nseE064.tmp nsr5F2C.tmp nsa83F6.tmp nst9A3A.tmp nsiFB91.tmp nsvBA36.tmp nsb51BE.tmp nstF05A.tmp nsj99CF.tmp nse4883.tmp nsuD19D.tmp nsh2120.tmp nsi71CD.tmp nswE003.tmp nsh6BCB.tmp nsb770A.tmp nsp2806.tmp nsi801D.tmp nsf2256.tmp nstEBF1.tmp nsq8C71.tmp nsg2CDD.tmp nsr5B00.tmp nsh7F5F.tmp nsc5B9D.tmp nsiE68F.tmp nsn5E26.tmp nsn2355.tmp nsq2D69.tmp nsyDA96.tmp nsv98E8.tmp nsrE7A4.tmp nsw1D60.tmp nsk9AC3.tmp nsp2301.tmp nsmDDC1.tmp nskFB25.tmp nskD2EA.tmp nsiB451.tmp nsj3F7C.tmp nszC01D.tmp nsqEB27.tmp nsr6396.tmp nsyC731.tmp nsfA9DA.tmp nsw345.tmp nsk25BE.tmp nsh55A4.tmp nsf3284.tmp nsc93AB.tmp nse3411.tmp nsuAD62.tmp nssD77D.tmp nse218F.tmp nsw4989.tmp nst1344.tmp nsjA1F1.tmp nsgED0D.tmp nswDF75.tmp nsb45F5.tmp nsg61D1.tmp nsfAB1D.tmp nsz21C6.tmp nsu4879.tmp nsj6C60.tmp nsi523D.tmp nsg6A17.tmp nsl24BB.tmp nst719.tmp nsz59A7.tmp nswC19.tmp nsmE3CE.tmp nslBAAE.tmp nsn16BB.tmp nscE40B.tmp nsf8A22.tmp nso593.tmp nsb47EE.tmp nsa5C29.tmp nsn9C3F.tmp nsy5309.tmp nseD7DF.tmp nst25AE.tmp nsw7671.tmp nsm5E39.tmp nsl83AF.tmp nsa4DA5.tmp nsl2D4C.tmp nsx5802.tmp nsz7CE4.tmp nskCEF.tmp nsi5588.tmp nsn4ECE.tmp nse5299.tmp nshA0E4.tmp nstD68.tmp nsdF20C.tmp nsy3B38.tmp nsw2DD8.tmp nsaDAC3.tmp nslEABE.tmp nst83B.tmp nst476A.tmp nscF669.tmp nsg5E07.tmp nsb9D36.tmp nsl4F2E.tmp MSVCR100.dll.dat nsuD780.tmp nsu4739.tmp nsw66C5.tmp nsb92C1.tmp nsiBF5.tmp nsk3317.tmp nskC70B.tmp nszE63B.tmp nso9367.tmp nsr69FA.tmp nscEEFE.tmp nstD990.tmp nsg7083.tmp nsu1F77.tmp 6 nsjE400.tmp nsjC27C.tmp nszA126.tmp nsj491F.tmp nsd1786.tmp nssC946.tmp nsn6BA9.tmp nsxBD0.tmp nsrB458.tmp nszB98A.tmp nsz2257.tmp nss3FFC.tmp nsv76C6.tmp msvcr100.dll.bak msvcr100(4566).dll nss1A4B.tmp nse43CC.tmp nsz70ED.tmp nsi3B59.tmp nsn767A.tmp nsnCBC7.tmp nstBE7A.tmp nsgF74A.tmp nsz9CE0.tmp nskE678.tmp nsl853D.tmp nsk3AC2.tmp is-lfl72.tmp nsf9413.tmp nsjDCB8.tmp nsk2703.tmp nsm7C70.tmp nsfEB90.tmp nsuE6FB.tmp nswF799.tmp nsi2DF8.tmp nsu8271.tmp nsrEEA0.tmp nswBE61.tmp nsr2F4E.tmp nsa50BE.tmp nsl266.tmp nsf2CFE.tmp nsh8A24.tmp nso3692.tmp nsn7621.tmp nszEEA8.tmp nslA185.tmp nsaF165.tmp nseF313.tmp nsb5718.tmp nsbB1D6.tmp nsqB200.tmp nsd732A.tmp nsg5416.tmp nssC81E.tmp nsv44B4.tmp nss3FEF.tmp nsbCC3A.tmp nsgEADF.tmp nsg9010.tmp nslAB92.tmp nsv397A.tmp nsjBEC6.tmp nsv32B9.tmp nsq7477.tmp nsk5884.tmp nsuFE95.tmp nsw41DD.tmp nsdEABA.tmp nsz5C93.tmp nsd1338.tmp nsn129A.tmp nsc7D39.tmp nslEC2.tmp nsgCD2E.tmp nsg2523.tmp nse859.tmp nsiAAF9.tmp msvcr100____0.dll F_CENTRAL_msvcr100_x86.1DEE2A86_2F57_3629_8107_A71DBB4DBED2 nsj85E8.tmp nsu74D7.tmp nss745A.tmp nss9CE3.tmp msv nsnA12F.tmp nsiCE2B.tmp nsd6C7A.tmp nsj31D9.tmp nso6145.tmp nsdC07C.tmp nsxF930.tmp EAAAAA.7BB698F3_FF95_4293_A870_7F608A90116D nsw89F3.tmp nsv6205.tmp nsd96C4.tmp nscB68.tmp nsn6722.tmp nstCC4C.tmp nsoEBD9.tmp nss4A2D.tmp nssACA.tmp nsn698D.tmp nsd85F6.tmp nsj6E7E.tmp nst5659.tmp nsq7997.tmp nswEFC3.tmp nsc3555.tmp nst2A24.tmp nsn76D7.tmp nssF21B.tmp nsa4041.tmp nslD1F6.tmp nsv6222.tmp nsfAAA5.tmp nsd9468.tmp nsxD9E6.tmp nsh6240.tmp nse35F.tmp nso3F82.tmp nsvE6EA.tmp nsiAEC9.tmp nsc9ED1.tmp nsx669E.tmp nsp13FC.tmp nsjDD17.tmp nso3EF7.tmp nsoF44E.tmp nsbA55B.tmp nsg54D.tmp msvcr100 (1).dll nsw79C8.tmp nsg42.tmp nsl57D9.tmp nsa2B.tmp nse19EE.tmp nszEFEC.tmp nsq753B.tmp nsx2738.tmp nsp97D1.tmp nsj7D52.tmp nsvD71C.tmp

This hash has been seen with multiple file names. Alternate names can appear when software is updated, copied between folders, packed by an installer, or deliberately renamed to avoid recognition. Compare the exact MD5 above before assuming two names refer to the same file.

Windows 10 51.0%
Windows 7 37.2%
Windows 8.1 7.0%
Windows XP 2.2%
Windows 8 1.4%
Windows Vista 0.5%
Windows Server 2012 R2 0.3%
Windows Server 2008 R2 0.2%
Windows Server 2003 0.1%

The most common operating system signal for nsvD71C.tmp is Windows 10 with 51.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

nsvD71C.tmp is identified as pe for 32-bit systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Format pe
Architecture 32-bit
Subsystem Windows GUI
Entry point 0x00011dfc
Image base 0x78aa0000

PE Sections:

Sections 4
Raw data 766976

Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.

.text 726016 bytes · 94.7% of section data
MD5 501ef5bb388bbceb56801e40228d4ec3
.data 19968 bytes · 2.6% of section data
MD5 0e5379595c27b788686868df5dd4d72b
.rsrc 1024 bytes · 0.1% of section data
MD5 037e4f2ebdf0a2942817b362a15cef5f
.reloc 19968 bytes · 2.6% of section data
MD5 6af60de9f61bd6b3c3e712a738561125

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

Report conclusion

This hash is currently recorded as clean

Use the MD5, publisher, signature, and observed paths in this report to verify that the file on your device is the same copy described here.

Scan with GridinSoft Anti-Malware Use a local scan if the file origin or behavior is unclear. Check this hash on VirusTotal

Recommended next steps

  • Compare the local file MD5 with 0e37fbfa79d349d672456923ec5fbbe3.
  • Check the file path, publisher, and signature against the details in this report.
  • Run a GridinSoft scan if the source, path, or behavior looks unusual.