Dropped Files | ZeroBOX
Name 1496c2871c33b6b2_montionhyper.sln
Submit file
Filepath C:\Users\test22\AppData\Roaming\MONTIONHYPER.SLN
Size 1.4KB
Processes 2096 (RegAsm.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 0153fcb98eb97ad7f95c144816b300b5
SHA1 18bc4ca4c3a03d66ebcdbc5e25f36d0b066e7276
SHA256 1496c2871c33b6b2384b4574b1f3fc581ee1c80e6dd3123ecdadf5445f9c5b52
CRC32 010675D6
ssdeep 24:pPEkMbjPe2TN+TeFfVlN+XSN+8FN+RHh1N+RHGqN+lbYN+l48EN+lvfN+lU8ANGm:pPqbjPeUXVlmSJCHh1CHVcY2Ekfes
Yara None matched
VirusTotal Search for analysis
Name 9f6badc3fdae2eec_hjds32.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\HJDS32.EXE
Size 532.0KB
Processes 2096 (RegAsm.exe)
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 89d77a6e1e3a08f6cbb5b440c8f47e29
SHA1 b9f2db35241435b4ceed98b58b63918a6f4ce2e2
SHA256 9f6badc3fdae2eec00ce41e5c07ccaef97eb9805d13328a1589e36fd1890181c
CRC32 DA7CEDD7
ssdeep 12288:Cflmc/U97143ei/xLxS0VMmX+gJmdqKkSl2N3m:CNtsCF/x9S0KaJuqnSl2N3
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Malicious_Packer_Zero - Malicious Packer
VirusTotal Search for analysis