Dropped Files | ZeroBOX
Name 3319b1f8d39388af_tmp5E96.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp5E96.tmp
Size 1.6KB
Processes 2560 (vbc.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 e4168f64099bc2f74674f3c6d0906687
SHA1 c2dbdf8b0c07b93a98ca6b0400efb69ed39b14ce
SHA256 3319b1f8d39388afffca2dcf0e3c77d7b1a3c2db1a87e003b388281445bad888
CRC32 7A5DBBCC
ssdeep 24:2dH4+SEqCH/7IlNMFQ/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBkYtn:cbhf7IlNQQ/rydbz9I3YODOLNdq3t
Yara None matched
VirusTotal Search for analysis
Name 6e6a936e3fb5c7e4_deskxitjaiaelu.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\DESkxiTjaiAELu.exe
Size 628.0KB
Processes 2560 (vbc.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 23e46ac3c8b6b48d9e13d62c8ec8fd8b
SHA1 e02f86a0b75bfc1b4b59daa2243f89b35bc53233
SHA256 6e6a936e3fb5c7e4447cd2c4b22a6510c0f85e33b6a1a7faf5ef977cccf3907d
CRC32 BC010742
ssdeep 12288:836ZwwHHUpCeFYsDCqp5Ua1Ir4Mg9r1PZZ8Ozz:8KZfngCpXG1IkMg9rSOz
Yara
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis