Dropped Files | ZeroBOX
Name b7c225ef3cc3e875_d93f411851d7c929.customDestinations-ms~RFcad402.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFcad402.TMP
Size 7.8KB
Processes 2692 (powershell.exe) 2124 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Generic_Malware_Zero - Generic Malware
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 4c31a7b4034310ef_svcservice.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\telemetry\svcservice.exe
Size 128.0MB
Processes 2908 (VoiceControlEngine.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 b068f435bd1e67c1fad9c7bf8596b1a0
SHA1 d0e35716b4540993aa235138d59dbb61bd6e5185
SHA256 00f55af3ee9220d632f1b3e15a2078aa96ba88d682293cf49c790c37a7424fd9
CRC32 E0CFD389
ssdeep 393216:lJW4TsKx/qZx4nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnE:LhsXZxj
Yara
  • UPX_Zero - UPX packed file
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis