flash

cGDmJSd.exe

Status: finished
Submission Time: 04.05.2021 21:35:09
Clean

Comments

Tags

Details

  • Analysis ID:
    404287
  • API (Web) ID:
    710731
  • Analysis Started:
    04.05.2021 21:36:27
  • Analysis Finished:
    04.05.2021 21:42:55
  • MD5:
    852d67a27e454bd389fa7f02a8cbe23f
  • SHA1:
    5330fedad485e0e4c23b2abe1075a1f984fde9fc
  • SHA256:
    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

clean
0/100

URLs

Name Detection
http://pesterbdd.com/images/Pester.png
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.apache.org/licenses/LICENSE-2.0.html
Click to see the 2 hidden entries
http://wwwrosoCPS/default.htm0
https://github.com/Pester/Pester

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hcrqdxq5.nd2.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbelfxck.h1f.psm1
very short file (no magic)
#
Click to see the 1 hidden entries
C:\Users\user\Documents\20210504\PowerShell_transcript.116938.XoqX98fJ.20210504213723.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#