Dropped Files | ZeroBOX
Name e364362cd6beb35b_information.log
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\AX754VD.tmp\information.log
Size 683.0B
Processes 1016 (loki.exe)
Type UTF-8 Unicode text, with CRLF line terminators
MD5 5ea41715d91b4cc25568c1056df97dcf
SHA1 80ab5f2ab8aa026e2434ca5ce21060e63dfb57f5
SHA256 e364362cd6beb35ba03074d320fe905ab43c51b82416057473631193fe6824a2
CRC32 04A342E4
ssdeep 12:N/YsugPcbFfgHwalJOvuwawfgTZKeYQTVh/P74B6Sb5PHUwcIcHZ2cpoZTBWpn:BYsugPcbFflaytnfReYotD4Bb5PhBc5R
Yara None matched
VirusTotal Search for analysis
Name 6ad926c3e06d68f2_r725k54.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\R725K54.tmp
Size 136.0B
Processes 1016 (loki.exe)
Type ASCII text, with CRLF, LF line terminators
MD5 885f0028bba9ae93fa9ba0e3692cd26b
SHA1 ad4aaede1e302eef45955b96367a9abcd8e0cc1f
SHA256 6ad926c3e06d68f2210103bec86ef2be69d837170c69d569e5e47a51936deace
CRC32 7341267E
ssdeep 3:BzrLR/u3MRrEIpB9msuQtAJAGjulkVX9AJAGjCXQQovn:BfLw8KSleXCWXQQy
Yara None matched
VirusTotal Search for analysis
Name ca0f82f2888de8ff_UserAgents.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\AX754VD.tmp\UserAgents.txt
Size 116.0B
Processes 1016 (loki.exe)
Type ASCII text, with CRLF line terminators
MD5 00d7a0630feac38b439216fb609f4f1d
SHA1 f4686b3fb60a22fff52bd179657a749e3572523f
SHA256 ca0f82f2888de8ffe2f9b1de55fbc490ecec5f1848d60eb98ae7f9c840d59c44
CRC32 60B4AD80
ssdeep 3:XkJKKQTJLB2DHHNaRN/JAL9hD0JFSF6W8XQdWukDE7Dbm:VLRB2DUb2RhQJFtXXQUuKEjm
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_Default_Google_Chrome_Autofill.log
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\AX754VD.tmp\Browsers\Default_Google_Chrome_Autofill.log
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 3cd73669af75e1d6_screen.jpeg
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\AX754VD.tmp\screen.jpeg
Size 23.0KB
Processes 1016 (loki.exe)
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1024x768, frames 3
MD5 71f46f6540da4b7a97958b71930bfd2d
SHA1 6418aeba3eef6dfb059e8d8f0a49259a5d9552c3
SHA256 3cd73669af75e1d621d88538afb0bda94a2b3549c220d6bc078f51baf18c0b7a
CRC32 F000B08D
ssdeep 384:0JaAaAIDjWFO3/vqcZdEydk4IEKbcE04AxYSPO:0AKInWUPvxlNA64Z2O
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name eb9bd9b19708c74d_South Korea_175.208.134.150_017BD04FB3BF45B681679E8F41FF87BF.zip
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\South Korea_175.208.134.150_017BD04FB3BF45B681679E8F41FF87BF.zip
Size 11.9KB
Processes 1016 (loki.exe)
Type Zip archive data, at least v2.0 to extract
MD5 a5256af22aa0a9f9fc00a6deff202ea2
SHA1 42d87997538988d6fc2c5fbf9ad85f6d7e30de99
SHA256 eb9bd9b19708c74d2d757a4e4582f98f227a23ad145213f105b77e565ec2ae17
CRC32 89B8B974
ssdeep 192:5dalulZFTgL7FE9prD524f4NxTlEN+6Oga/b8w2ZFBBszDROhleWotSUO6X:jasjTEWc4upLgazj2Zh8DYuFS/a
Yara None matched
VirusTotal Search for analysis