Dropped Files | ZeroBOX
Name bb9181b3935b8681_tmp19F5.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp19F5.tmp
Size 1.3KB
Processes 1580 (RegSvcs.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 be81f72fa4dbc827132836ee2af92c96
SHA1 fe5ded04ab4932dea6cf414e9e4428f43da70d03
SHA256 bb9181b3935b8681a71b578f8166883e61380de6181df82d05f14829323fbf0f
CRC32 7AA438E3
ssdeep 24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Rb5xtn:cbk4oL600QydbQxIYODOLedq3Sb5j
Yara None matched
VirusTotal Search for analysis
Name 50628191b6fd0c0e_tmp15ED.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp15ED.tmp
Size 1.6KB
Processes 2472 (VSB_093876535367-03987653456378.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 3b49e53ac1a3e70252fb616f33251bd6
SHA1 5a690ce0069bb13c52ed9c2dd3814a7987cac865
SHA256 50628191b6fd0c0ed0e6da55ee24ca783805d98d4dd838a64139f410aacebf54
CRC32 980EC09D
ssdeep 24:2dH4+SEqCH/7IlNMFQ/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBPtn:cbhf7IlNQQ/rydbz9I3YODOLNdq3P
Yara None matched
VirusTotal Search for analysis
Name 364b9f6c023bb347_run.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\run.dat
Size 8.0B
Processes 1580 (RegSvcs.exe)
Type zlib compressed data
MD5 84eadff8aed166a3f2861f774ef5fb7b
SHA1 a383d5a9773c819252a69bb9fac5811bf61ec039
SHA256 364b9f6c023bb347151dfeb621b9a3abcd21088721685be39177851926f259a9
CRC32 611C7EA7
ssdeep 3:zs8:zv
Yara None matched
VirusTotal Search for analysis
Name 3086d914f6b23268_tmp1948.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp1948.tmp
Size 1.3KB
Processes 1580 (RegSvcs.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 8cad1b41587ced0f1e74396794f31d58
SHA1 11054bf74fcf5e8e412768035e4dae43aa7b710f
SHA256 3086d914f6b23268f8a12cb1a05516cd5465c2577e1d1e449f1b45c8e5e8f83c
CRC32 49853FE8
ssdeep 24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mXxtn:cbk4oL600QydbQxIYODOLedq3ZXj
Yara None matched
VirusTotal Search for analysis
Name d46e34924067eb07_task.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\task.dat
Size 57.0B
Processes 1580 (RegSvcs.exe)
Type ASCII text, with no line terminators
MD5 08e799e8e9b4fda648f2500a40a11933
SHA1 ac76b5e20ded247803448a2f586731ed7d84b9f3
SHA256 d46e34924067eb071d1f031c0bc015f4b711edce64d8ae00f24f29e73ecb71db
CRC32 EEF8DB45
ssdeep 3:oMty8WddSWA1KMNn:oMLW6WA1j
Yara None matched
VirusTotal Search for analysis
Name 739d16123f0694e8_gimlstkwtxdiko.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\gImlSTKwTxDIkO.exe
Size 1.8MB
Processes 2472 (VSB_093876535367-03987653456378.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 c4d393054bc0954eedc9f72d5edc1b0e
SHA1 dc7e9ef74103d74fb724c4afb1dfbd874df1fb20
SHA256 739d16123f0694e828ac3fcbb257733c32d9b2dae6011b27da21b424cf2e74ca
CRC32 D7D95EFE
ssdeep 24576:g41WDonQSMR3NdqHvab3XcfOdFlH1jU5F5+Lmov74d2jwVgqIDhzO:g4YSMR3NdqHv63sWVjU5z+jW2jw4hzO
Yara
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis