Dropped Files | ZeroBOX
Name e3b0c44298fc1c14_nsxC4A3.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nsxC4A3.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 41634ca43a51a576_qrwlz.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\qrwlz.exe
Size 53.0KB
Processes 1648 (dcrossw.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4d1007c556545f9e1e51305ee33b1528
SHA1 583c91bfc0a24427ee8d37f0f3513c851af601d8
SHA256 41634ca43a51a576c5c1a3047e94a74f759106642c4a69239eddbfb4b2961a77
CRC32 E2A2FB38
ssdeep 768:iZ5VK/0uZi5G9iRLIF2OKbWpLV01BsHD3nPYr6LoQ696QsM/pL5:w5VUBT9iR0iWptDPYr66/sM55
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 2ba35c2e36ac2e8e_aztvpotk.nx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\aztvpotk.nx
Size 8.0KB
Processes 1648 (dcrossw.exe)
Type data
MD5 8159a42ea5a1566ea882be37bea844ea
SHA1 f2216bf5a29fc3c8b7f9c487ab7febe772f4238b
SHA256 2ba35c2e36ac2e8efb8f9f1569c99b517c90dbd7d4e99d6b8558de8f987bf9c7
CRC32 0237461A
ssdeep 192:darcitQvArWiPvAub9dizdMFFJIS8O4GF67KS/5lId8vNmPX:uCYrNPvAwB4O4GMvj0pX
Yara None matched
VirusTotal Search for analysis
Name 86f60221b9f0b9b4_erzstkxdhdq.i
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\erzstkxdhdq.i
Size 496.0KB
Processes 1648 (dcrossw.exe)
Type data
MD5 b356d6d55240de562b92287d24bbac0a
SHA1 5132f57cda5d1d11223601745e31c693d989a848
SHA256 86f60221b9f0b9b4921ebdcf7ada7cfad2a9212244ceb0fe12ca2c5b20ee9aac
CRC32 60530DA5
ssdeep 12288:TeVJdBPAdp0u9WGP0sE9Iugc79UGXKblX1+y:T+Y30RG8x9J7VablH
Yara None matched
VirusTotal Search for analysis