flash

covid pool waiver.rtf

Status: finished
Submission Time: 17.06.2020 15:20:43
Clean

Comments

Tags

Details

  • Analysis ID:
    239238
  • API (Web) ID:
    374345
  • Analysis Started:
    17.06.2020 15:20:44
  • Analysis Finished:
    17.06.2020 15:28:11
  • MD5:
    d3ee0765f8fb999d8a96de856efdb378
  • SHA1:
    55e7a06bb6085052f59f0261aa475144131cd91e
  • SHA256:
    19a3f8b1d7af40287653193d2ed53b105896669d26d12a67d826f1ffc418bcc4
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

clean
0/100

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Run Condition: Potential for more IOCs and behavior

clean
0/100

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{119796B7-F0F3-4B7B-AC56-C94BFECCFB2B}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E4F42A7B-8259-49BF-BA94-492CAF26B61B}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\covid pool waiver.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Tue Jan 28 13:45:43 2020, atime=Wed Jun 17 12:21:10 2020, length=193, window=hide
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$vid pool waiver.rtf
data
#