flash

5Imprimir_2via.pdf.BAT

Status: finished
Submission Time: 11.09.2019 20:36:41
Malicious
Evader

Comments

Tags

Details

  • Analysis ID:
    173091
  • API (Web) ID:
    240651
  • Analysis Started:
    11.09.2019 20:37:47
  • Analysis Finished:
    11.09.2019 20:42:44
  • MD5:
    48e7efd9779a97a65dea059e2a45ba84
  • SHA1:
    1afd575980d780dca13060680c3d59a7dd2ddc9d
  • SHA256:
    67715234f8d9d7c42b5109d54a58d76edc2323a90fbf52fc991a261e6b238340
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
48/100

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dieaub5m.y3l.psm1
ASCII text, with no line terminators
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ga1fchu4.qnm.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_khh3f3kp.5lk.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rrcmw55a.5d5.psm1
ASCII text, with no line terminators
#
C:\Users\user\Documents\20190911\PowerShell_transcript.138727.__PwuyVj.20190911203916.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\Documents\20190911\PowerShell_transcript.138727.pkXm9nol.20190911203908.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#