Dropped Files | ZeroBOX
Name a8917c2a2c72cd9c_viposhopami.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\64-f4e04-c63-98d8d-23884bc27b79f\Viposhopami.exe
Size 585.5KB
Processes 2536 (git1.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 ab0394e973175c02ee34a0322794906a
SHA1 37dc6e0262dd6dfc6a1a79357c8247c2641d38be
SHA256 a8917c2a2c72cd9ca6049b3bb03cadb18e59676cc3f0039d9545b72d72874075
CRC32 9D0DADB4
ssdeep 12288:HPXyqsaKunH8alXA/COfsjQNk3T14VWS:HPXBsz
Yara
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 21d03f19c4b1c12d_red_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\red_shield[1]
Size 3.4KB
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 87de5d9a3403e1d7635885cbaa52389d
SHA1 50b32c5966331e3e27bef987fd1da0129423d348
SHA256 21d03f19c4b1c12db2feb8fb3a373d7e378976ecdfb64efb300204edc8947d3d
CRC32 15814E36
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTzVcxkZFd/:5SDS0tKg9E05TJcxi
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name d0ba19f5e334e60f_invalidcert[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\invalidcert[1]
Size 2.1KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 66f441cef8801549c2f0ff12cbe752a5
SHA1 de506bfb63225b3cc084ae292d4bf98a21ae6250
SHA256 d0ba19f5e334e60fb5056bc2e05b97de09aee4db49e5e11abde482bab9c4e8fb
CRC32 13C10CC2
ssdeep 48:mPntofz4/i5DjktylVDJlObUBsBXcysTqysg2Bp5Bi8OwaBynLysTqys4Bwy/Ae:SE4a5HlVDJMbUB2XcylyNkpfi8OwgynN
Yara None matched
VirusTotal Search for analysis
Name c9156aba215d8c2f_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 252.0B
Processes 2536 (git1.exe) 604 (iexplore.exe)
Type data
MD5 3b1c080eb2cfe12bab401a6eee7e9531
SHA1 ef78738a46bccab7bb972518f1ada11b777e9dcf
SHA256 c9156aba215d8c2fea7510add5f5f2ec989a443fa74883485fd673f11b046541
CRC32 137C17C2
ssdeep 3:kkFklS1Nl1fllXlE/so82llPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB15XnTolw:kKN1Nl29liBAIdQZV7MGieX
Yara None matched
VirusTotal Search for analysis
Name 70f316a5492848bb_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\down[1]
Size 3.3KB
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 555e83ce7f5d280d7454af334571fb25
SHA1 47f78f68d72e3d9041acc9107a6b0d665f408385
SHA256 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
CRC32 9EA3279D
ssdeep 96:/SDZ/I09Da01l+gmkyTt6Hk8nTjTnJw1Ne:/SDS0tKg9E05TPoNe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name eea7642ab9073eae_recoverystore.{b7abdbe5-a2a1-11ed-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B7ABDBE5-A2A1-11ED-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2836 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 299b02efedabceb44dc10c75edd9a670
SHA1 6f7aa419b0d3f82ca5c881edbb4e3fcc86cfd8fd
SHA256 eea7642ab9073eae9309640d0a0c1093631127f48eebbd5e549669fb1575b74d
CRC32 B98CF72A
ssdeep 12:rlfF22rEg5+IaCrI0F7+F2JrEg5+IaCrI0F7ugQNlTqbax7+gNlTqbax7j:rq25/1J5/3QNlWMNlW
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 2536 (git1.exe) 604 (iexplore.exe)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name 8c1a062cf83fba41_poweroff.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-NK702.tmp\poweroff.tmp
Size 981.5KB
Processes 2944 (poweroff.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 01515376348a54ecef04f45b436cb104
SHA1 111e709b21bf56181c83057dafba7b71ed41f1b2
SHA256 8c1a062cf83fba41daa86670e9ccdb7b7ae3c913fe6d0343284336d40c394ba0
CRC32 AB83FFF1
ssdeep 24576:sQYh1yLmSKrPD37zzH2A6QD/IpqggE2CfNafSWVyx9eR:Q02rPD37zzH2A6SBIfNafwC
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name c34233832ba58e65_lukyqypolo.exe
Submit file
Filepath C:\Program Files (x86)\Windows Sidebar\Lukyqypolo.exe
Size 126.0KB
Processes 2536 (git1.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 70a9b681d28137cfb4f0b4ab59ef51c6
SHA1 91d2af3d463821562b8fe9be06d4b304ebc2585b
SHA256 c34233832ba58e65dfaf36d7be1c5395326a9f601e894c6615748ab5600e0220
CRC32 980E17C1
ssdeep 3072:8kIyEk+sfa7YyBJFYDmuStguz3j2qtB+KN+m1+zAqSoMY:8kIyxfaDJFYCuStgoiJ++m18AqDM
Yara
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name fc54d6f630efd41d_lupisaeguwu.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\85-2a844-436-38eb4-cee5932e512e3\Lupisaeguwu.exe
Size 468.5KB
Processes 2536 (git1.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 c4ffd52c9e7fd2fe9ce71298c36d1ec2
SHA1 c0a15ed6bb86c599d44961ada6e83de142de50fe
SHA256 fc54d6f630efd41d501da9e15908c983f1ee8a92f33bc17f494b784e93aaf08a
CRC32 E8482CDD
ssdeep 12288:mDVlD65e5mjPJ9GG0UxVxIjc6H8cYKxVwihRdLWAoz3rRyPEIP3fGL42+lFVrRTA:m/PNG9Lr2brRTKJ
Yara
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 8a94163256a722ef_poweroff.exe.config
Submit file
Filepath C:\Program Files\Windows Mail\IMRMEEDGJJ\poweroff.exe.config
Size 1.2KB
Processes 2536 (git1.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 98d2687aec923f98c37f7cda8de0eb19
SHA1 f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA256 8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
CRC32 2328D28C
ssdeep 24:2dZmht+SDfy4GOy4TO4q5X4tndGubyB8GRyF:ccdfy4G74TO4qN4hRN
Yara None matched
VirusTotal Search for analysis
Name 9c0d294c05fc1d88_kenessey.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\85-2a844-436-38eb4-cee5932e512e3\Kenessey.txt
Size 9.0B
Processes 2536 (git1.exe)
Type ASCII text, with no line terminators
MD5 97384261b8bbf966df16e5ad509922db
SHA1 2fc42d37fee2c81d767e09fb298b70c748940f86
SHA256 9c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
CRC32 AC75BF49
ssdeep 3:KWigXn:KWigXn
Yara None matched
VirusTotal Search for analysis
Name 68dbf31bcdfa489f_unins000.dat
Submit file
Filepath C:\Program Files (x86)\powerOff\unins000.dat
Size 1.2KB
Processes 2988 (poweroff.tmp)
Type data
MD5 2dbee055677e361430d62af38433e3fd
SHA1 6443f47c119b688aa2131431774cd3357c78138b
SHA256 68dbf31bcdfa489f31c889af53cdf87c5cad6b21446bf5b547eb2f61332525b9
CRC32 07B17DF4
ssdeep 24:Db0UTQGcRQtVM+ExwRQuQqdLVM6LVMrRUV1/ln:DQaQLRQt4xwRQuQqdLrLxr/l
Yara None matched
VirusTotal Search for analysis
Name 90a1bb061e31a5c2_{b7abdbe6-a2a1-11ed-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B7ABDBE6-A2A1-11ED-948E-94DE278C3274}.dat
Size 6.0KB
Processes 2836 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 f1b627f0fb89bff08346c2495d0eec20
SHA1 1c829ccc684839f4e40dd06216b4fc1ee3a329fc
SHA256 90a1bb061e31a5c2d53923e27cd2f69a6dffc4e0b7a99b3abbc9aa5657df2f99
CRC32 FB01A70B
ssdeep 48:rsGY6cxV7y1MzzOksgMzzmBLeaMzzuMzz2//r1MzzcgMzh:KukOkmmByTn23rky
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 003d30e7d128c677_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\errorPageStrings[1]
Size 2.5KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name c23f223e4d981eb0_poweroff.exe
Submit file
Filepath C:\Program Files\Windows Mail\IMRMEEDGJJ\poweroff.exe
Size 838.7KB
Processes 2536 (git1.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c0538198613d60407c75c54c55e69d91
SHA1 a2d713a098bc7b6d245c428dcdeb5614af3b8edd
SHA256 c23f223e4d981eb0e24cadae9dc0c60e40e12ff220d95c9dd2a5b6220fa6d6ed
CRC32 A2395C84
ssdeep 12288:+Qi3reTWxN15q3ZsRfGGduNOXPTd7yts/G6UWi9P3P5cN1IGh0nqPjU6xg7:+QiuWl55R+OeOX7UeRAP3xcNLeqPjUX
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name f9d12723a5ac3ade_power off.exe
Submit file
Filepath c:\program files (x86)\poweroff\power off.exe
Size 621.0KB
Processes 2988 (poweroff.tmp)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 8d0b18eb87590fa654da3704092b122b
SHA1 aaf4417695904bd718def564b2c1dae40623cc1d
SHA256 f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457
CRC32 11692D45
ssdeep 3072:paeTGhFvdX34iSh+gP01dM6U7Ho2nZ11YFVagzidIaYKaQFiyC6/sIvdX34iSh+B:p3TSvwo+TI9gNMwsEvwoLTI9AAI
Yara
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-UKO1T.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 2988 (poweroff.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name f2afc04a24c9d89d_red_shield_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\red_shield_48[1]
Size 6.8KB
Type PNG image data, 40 x 48, 8-bit/color RGBA, non-interlaced
MD5 f413dd8a75b81a154a1fd5e4c4a0a782
SHA1 667f7e3da51ca3417a1feb66d238466423c9487d
SHA256 f2afc04a24c9d89d3c2f0d73f8cd6fb6b65adbe333196c3f99cc7d6868847ceb
CRC32 D96BDACF
ssdeep 192:8SDS0tKg9E05Tz045xhOwZtbiFHsrC3rlTqpHbW:7JXE05d5xhOwtGsSTqpHC
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name fbc23311fb5eb53c_background_gradient_red[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient_red[2]
Size 868.0B
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x800, frames 3
MD5 337038e78cf3c521402fc7352bdd5ea6
SHA1 017eaf48983c31ae36b5de5de4db36bf953b3136
SHA256 fbc23311fb5eb53c73a7ca6bfc93e8fa3530b07100a128b4905f8fb7cb145b61
CRC32 C08DA614
ssdeep 24:vk9YMW80o0XxDuLHeOWXG4OZ7DAJuLHenX36n8R0O3kwd2q:M9YM3uERAq8uyJdB
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name de49590462f15f50_unins000.exe
Submit file
Filepath c:\program files (x86)\poweroff\unins000.exe
Size 992.7KB
Processes 2988 (poweroff.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0dc551f0d46e1db221d08790f7f94e96
SHA1 3d0844ec278555c450ab4fad78ed8beb55233bd6
SHA256 de49590462f15f506aa8ecef4d20e74cb54d9afb33d4c28829746e775737f690
CRC32 F3A85DE8
ssdeep 24576:0QYh1yLmSKrPD37zzH2A6QD/IpqggE2CfNafSWVyx9ej:402rPD37zzH2A6SBIfNafwG
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name afce792469d28568_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\ErrorPageTemplate[1]
Size 2.2KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name 6e854e6c33d7caa7_poweroff.lnk
Submit file
Filepath C:\Users\Public\Desktop\powerOff.lnk
Size 1016.0B
Processes 2988 (poweroff.tmp)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Feb 1 17:30:40 2023, mtime=Wed Feb 1 17:30:40 2023, atime=Thu Oct 7 05:10:24 2021, length=635904, window=hide
MD5 0d642a57f06bc20196ff448659c13c9c
SHA1 4b5598b91fdbf692fc60afae6db7555a0a29228f
SHA256 6e854e6c33d7caa7ebd4fd6e1c4fe7e831e8b77e73e61f6f3103c8c896e0f3d4
CRC32 24E9D554
ssdeep 24:8mwxudOE4ZkhcvEIuAkQqQCdWdqddUPPyx:8mRdOvk6v51kQqQCdWdqdenyx
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name c686babc034f53a2_green_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\green_shield[1]
Size 3.4KB
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 254d388ce19d84a54fd44571e049e6a6
SHA1 51ca725642f679978f5880278e5cac5ca4f70fae
SHA256 c686babc034f53a24a1206019e958ba8fc879216fd7b6a4b972f188535341227
CRC32 265B0B9C
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTkN9D6ZB+:5SDS0tKg9E05TkN92ZE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 388a796580234efc__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-UKO1T.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 2988 (poweroff.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
CRC32 2CDCC338
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name ba92995d1296b989_invalidcert[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\invalidcert[2]
Size 4.9KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 57868b56f2ae430d15693e82a827ddb5
SHA1 c72b54f285f93e0ada5d1991dd2e8d1a14aa6a0c
SHA256 ba92995d1296b989dc78b21e8c7eaadc799e91db819f3f83bfba817b28df6e4b
CRC32 6CA10D5C
ssdeep 96:UqUHCkAs5PFkiGjUpG9gHdk0iSAu5hfeGNBz1t9hS:9ULAsnkdjo2gnNBz39hS
Yara None matched
VirusTotal Search for analysis
Name 3231a745b5367d81_poweroff.lnk
Submit file
Filepath C:\ProgramData\Microsoft\Windows\Start Menu\Programs\powerOff.lnk
Size 1.0KB
Processes 2988 (poweroff.tmp)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Feb 1 17:30:40 2023, mtime=Wed Feb 1 17:30:40 2023, atime=Thu Oct 7 05:10:24 2021, length=635904, window=hide
MD5 8337b55ea31b56ae0383f20a2aec608f
SHA1 b48ce40b44a03aa1efac23817346c9a28044f083
SHA256 3231a745b5367d817b07857214905475dd54b0f039c525000873c0169303c0b0
CRC32 63D64FDF
ssdeep 24:8mwxudOE4ZkhcvEIuAkQqndWdqddUPPyx:8mRdOvk6v51kQqndWdqdenyx
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis