Dropped Files | ZeroBOX
Name b7c225ef3cc3e875_d93f411851d7c929.customDestinations-ms~RF202171d.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF202171d.TMP
Size 7.8KB
Processes 2704 (powershell.exe) 2076 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Generic_Malware_Zero - Generic Malware
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name ebcaac70a5310f16_svcservice.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\telemetry\svcservice.exe
Size 128.0MB
Processes 2868 (VoiceControlEngine.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 cdf586030c1c729ac75ef0e3c64f1d57
SHA1 b6cda7086706bd4b4f2fefc163e4a2116b594a85
SHA256 adb549bf86d2229ff8541832575f36e8199da3b11b66289de7e463bf50f9078f
CRC32 89B88B55
ssdeep 3145728:Lap333333333333333333333333333333333333333333333333333333333333i:x
Yara
  • UPX_Zero - UPX packed file
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis