Dropped Files | ZeroBOX
Name 1b2c2ea44fa556e6_vapgpysfvbb.w
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\vapgpysfvbb.w
Size 118.0KB
Processes 1000 (dcrossc.exe)
Type data
MD5 15802687753d70d385dff926b487445c
SHA1 db617f50d0ff65c6b8b97aaaeb8be916371d1cbb
SHA256 1b2c2ea44fa556e60b4582182a4761b586c94fdf09bb562d5bf64aa4992b5eb6
CRC32 269658B7
ssdeep 1536:VEE/yEsjOBZNbdNa8ZMd09lk1R2xRDQs8KxsNj1k9TJ8O5rCftoxF+pYJn53zI:d69I68Gd0nWR20l2Hrh+0nJc
Yara None matched
VirusTotal Search for analysis
Name 00b2270ccd70fcdb_gvqqarcyufs.g
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\gvqqarcyufs.g
Size 8.0KB
Processes 1000 (dcrossc.exe)
Type data
MD5 c7ebdd336ad1578c36a8ccaf38e97b77
SHA1 d20e5d8495bbd4cd6466459e6cbdc84b9c08148a
SHA256 00b2270ccd70fcdbe180c35ec5390eb05b92fa52c7577313fc494237bdd2e05b
CRC32 9B24F568
ssdeep 192:darcitQvArWiPvWeb9dXAlttiSNuVWKwvPttC8MmLh:uCYrNPvWggQV7KqTm9
Yara None matched
VirusTotal Search for analysis
Name 2de68132ddd15b8c_ajulw.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\ajulw.exe
Size 46.5KB
Processes 1000 (dcrossc.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7a6887d3c2013eb235f15c000db7b2ea
SHA1 ba2a810ebc710310d60585c39128318bdc7622b6
SHA256 2de68132ddd15b8c941938e7d1bb2556ad7fb185797a48d197f3f1af0b97dc44
CRC32 FB68D503
ssdeep 768:0o4wjtdAIQAT/hjxZfLapPLGbYyuEP5BWFNKJMidVa0h:kwjtdAIQM/9WJLu/y8
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name e3b0c44298fc1c14_nssC0DA.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nssC0DA.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis