Dropped Files | ZeroBOX
Name 44c412101b9da1f3_230509.bat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\230509.bat
Size 3.2KB
Processes 2220 (powershell.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 2e0b68286c2673b12406c98c4c13b739
SHA1 35c681d68e39d8e7e76bdd4611d0538e1aa85f69
SHA256 44c412101b9da1f32570ce8ac03a727af560f9b7fc74e4bf97d5d364384da647
CRC32 B53ECBE8
ssdeep 96:zHUa0Wq7wIl8ACH8aygBRygBuymQiUXpNgz:z0bT7l+XcaygBRygBuymQiUXIz
Yara None matched
VirusTotal Search for analysis
Name 68633cfa9e84f1f5_mobuv0cw.out
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\mobuv0cw.out
Size 607.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 6306f28d716887a265dd4f6123149d45
SHA1 6b93ef1ec2a44b5c9f6405c43336739fc9091942
SHA256 68633cfa9e84f1f53b7aaaba234cb61a789efa70e3634fa09ed918cca83c6016
CRC32 AA42D227
ssdeep 12:K4OLM9nzR37LvXOLMyJJwnPAE2xOLMGHuKai31bIKIMBj6I5BFR5y:K+9nzd3BaenIE2nGHuKai31bIKIMl6IU
Yara None matched
VirusTotal Search for analysis
Name 1e8ab000c1a02af1_RES4BCA.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\RES4BCA.tmp
Size 1.2KB
Processes 1944 (cvtres.exe) 2996 (csc.exe)
Type Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x406, 9 symbols
MD5 f76a4e5c42a982c759ee441fd9a30449
SHA1 28ba2a14a45860c7a02a9af3f8cedea08aef9dd6
SHA256 1e8ab000c1a02af1137a62fe4c034f5823d9ef0baa31cea34313f4f808ae088b
CRC32 053F2BB7
ssdeep 24:HvsjJ9YernID1JmHJUnhKLI+ycuZhN8iGakSviXPNnqjtd:UMernIJmmnhKL1ul7Ga3KFqjH
Yara None matched
VirusTotal Search for analysis
Name 0336f0a6f2dc4095_CSC4BB9.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\CSC4BB9.tmp
Size 652.0B
Processes 2996 (csc.exe)
Type MSVC .res
MD5 6a94663da40fcd83a1e247599b450641
SHA1 fd6a32060e4fd6f774a34f985c81c6cae7f16ba8
SHA256 0336f0a6f2dc4095683f09070e3a91b578468f1372f6701a083127c24fd5d765
CRC32 065310C1
ssdeep 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryaiGak7YnqqviXPN5Dlq5J:+RI+ycuZhN8iGakSviXPNnqX
Yara None matched
VirusTotal Search for analysis
Name 2f7622ff10865acf_owptouvz.out
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\owptouvz.out
Size 607.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 23ce8597fbe788831cdcfb5833d808c1
SHA1 ff90cf425592a3e1172a7e9f7372ba2c719ebda3
SHA256 2f7622ff10865acfb678ad86670c846ac217a75f150112bc3940fea681978a7d
CRC32 868E15EA
ssdeep 12:K4OLM9nzR37LvXOLMRfenPAE2xOLMRw1Kai31bIKIMBj6I5BFR5y:K+9nzd3BRGnIE2nRw1Kai31bIKIMl6IU
Yara None matched
VirusTotal Search for analysis
Name 94f6d162d47da132_워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp
Submit file
Size 57.5KB
Type Hangul (Korean) Word Processor File 5.x
MD5 c7b099c4f8b3e909becd086f29e18f91
SHA1 bf0bcd4ee75824f16f7de6c5625d4a177aa7d58e
SHA256 94f6d162d47da1320dc7194bfff2d78590353b59358a619d9ca8b68188d9368a
CRC32 8BC0627C
ssdeep 1536:pbUiut8Ihn1XwS8wqYQrdb9YNSxpL/Y8:VPdIhN4dqNqpL/Y
Yara
  • HWP_file_format - HWP Document File
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name e5231270257f1727_owptouvz.0.cs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\owptouvz.0.cs
Size 259.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text
MD5 560e1b883a997afcfa3b73d8a5cddbc1
SHA1 2905f3f296ac3c7d6a020fb61f0819dbea2f1569
SHA256 e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea
CRC32 7A3E756E
ssdeep 6:V/DsYLDS81zuBph+HjLmatlJOmMG4SRNLGeUy:V/DTLDfuBphILmIFGeUy
Yara None matched
VirusTotal Search for analysis
Name 19d8b9cee9118c2e_mobuv0cw.cmdline
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\mobuv0cw.cmdline
Size 311.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
MD5 1ade3f540e15ad5cbcac7ee0377d99f6
SHA1 0072a08d67168d2a080fb04c84be58ce02249f9c
SHA256 19d8b9cee9118c2ea1153c21278ee8e3d4d54f4e0db16b55a4997578ce773389
CRC32 670A2C20
ssdeep 6:pAu+H2LvFJDdq++bDdqBnmQpcLJ23fjmJJHQmGsSAE2NmQpcLJ23fjCHn:p37LvXOLMyJJwnPAE2xOLMGHn
Yara None matched
VirusTotal Search for analysis
Name b8ab856c3fe7d3bf_RES4FE1.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\RES4FE1.tmp
Size 1.2KB
Processes 1116 (cvtres.exe) 200 (csc.exe)
Type Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x406, 9 symbols
MD5 0f792e31eb11742e3abf785171d9c4c4
SHA1 b95419c4cd67dd79323d7ee96a4788cc8a2ed42a
SHA256 b8ab856c3fe7d3bfdad416fb5b6b19b8a8d1c0d11bde00c25c476a184acbd358
CRC32 A1401213
ssdeep 24:Hi/sjJ9YernX/oCmHaoUnhKLI+ycuZhNOakS2PNnqjtd:CkMernX5mYnhKL1ulOa3KqjH
Yara None matched
VirusTotal Search for analysis
Name 722ca53173909946_RES49D6.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\RES49D6.tmp
Size 1.2KB
Processes 2908 (cvtres.exe) 2804 (csc.exe)
Type Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x406, 9 symbols
MD5 5cc2b19a20244600e588238a17d75b0c
SHA1 d3aabb2bdd16e5a5ef7519cdd92d5bbe1f9589a4
SHA256 722ca531739099460abc906c6c2b9701d4277c23f5f7eff9e72d14b393fcca20
CRC32 6D6B84C0
ssdeep 24:HvsjJ9Yernw5S33mHNiUnhKLI+ycuZhNyakS6PNnqjtd:UMernwcHmt9nhKL1ulya32qjH
Yara None matched
VirusTotal Search for analysis
Name 43027b7ef84d6ce0_n5j0ib9u.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\n5j0ib9u.dll
Size 3.5KB
Processes 2804 (csc.exe) 2548 (powershell.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 9c54424f0f09ba24a9bb3e3c3029fd5f
SHA1 af3536be635304f7f3d0f4ff3ee3b0f22d31dee1
SHA256 43027b7ef84d6ce07e30df8b6e356e0fc07c938fd038a07797e4ed5f4091e27b
CRC32 E0722526
ssdeep 24:etGSzN6G7nLsKpHq7sEzuALmpbdPtkZfoRlFYmI+ycuZhNyakS6PNnq:6siHq7sHAuuJoRfj1ulya32q
Yara
  • Is_DotNET_DLL - (no description)
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 9d281dfae81cb30a_워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp.lnk
Submit file
Size 1.2KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue May 9 15:13:21 2023, mtime=Tue May 9 15:13:21 2023, atime=Tue May 9 15:13:21 2023, length=58880, window=hide
MD5 c97a1d7aaa7308510a9f49faff056199
SHA1 48cfc65058cb4d11a51b7944e03fa35512b99e67
SHA256 9d281dfae81cb30a3b8e32d910575d6575a614ae2aaa28d3354a7ad5585526b4
CRC32 C51E3380
ssdeep 12:8fFAacmR4cZCrR8EvSWCR+/jnUgzU14nOWlqjz8duCOLM1av4Q1Hjz8Q1Hjz8QwK:8basERdWR2W14nwyRQvNZVZP6Pyd
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name cb3ccbb76031e5e0_3c428b1a3e5f57d887ec4b864fac5dcc
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
Size 914.0B
Processes 2548 (powershell.exe)
Type data
MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
CRC32 5017495B
ssdeep 24:c0oGlGm7qGlGd7SK1tcudP5M/C0VQYyL4R3fum:+JnJ17tcudRMq6QsF
Yara None matched
VirusTotal Search for analysis
Name fde0478411e3f00d_n5j0ib9u.pdb
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\n5j0ib9u.pdb
Size 7.5KB
Processes 2804 (csc.exe) 2548 (powershell.exe)
Type MSVC program database ver 7.00, 512*15 bytes
MD5 e91876e2234e69d78869c3246b408b89
SHA1 d2e1bd7d081a712e145908a5df01dca492026e40
SHA256 fde0478411e3f00df6a31f579c8781f9c2ce4564913c07949adb1ea7f7562ccf
CRC32 37811A89
ssdeep 6:zz/BamfXllNS/2NBovtl31mllxrS/77715KZYXxGQu+e0KpYXRNBo3qMoGggkslT:zz/H1W/2NBWlSXS/pw2qGNB83RD
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_n5j0ib9u.err
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\n5j0ib9u.err
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 348e6563988fff75_CSC4DDC.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\CSC4DDC.tmp
Size 652.0B
Processes 1784 (csc.exe)
Type MSVC .res
MD5 6f944f09dc567d31d353b57b8df6cd6e
SHA1 42259c5bac8da31e83a8cc9c59bec8691a833848
SHA256 348e6563988fff757e5961fa47da3b2279ec0e9ec5649a9f16e7c042afb1d8af
CRC32 61C7A4AE
ssdeep 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryS+YGak7YnqqJ+YXPN5Dlq5J:+RI+ycuZhNo+YGakSJ+YXPNnqX
Yara None matched
VirusTotal Search for analysis
Name f6d4ac5b82dde2df_temp.folder.lnk
Submit file
Filepath C:\Users\test22\AppData\Roaming\HNC\Office\Recent\Temp.folder.lnk
Size 823.0B
Processes 2428 (Hwp.exe)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Directory, ctime=Wed Jan 31 20:32:29 2018, mtime=Tue May 9 15:13:24 2023, atime=Tue May 9 15:13:24 2023, length=65536, window=hide
MD5 9e8b889ea6d19523b93f3ef00f992b46
SHA1 9041c9a981e46baaccb911b32a35e40ddaeefb51
SHA256 f6d4ac5b82dde2df9d9bb8f29557cb0a707d0326f96d68281a9800b2d0d715d6
CRC32 69BCC6DC
ssdeep 12:8p7ssh64cZCrR8EvSWCR+/jnUg8izCCOLMa1Swua4t2YLEPKzlX8yvMM:8p7dsERdWR2NzNRak6Py9
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name d7d6f5ff96264361_hi1x_fj5.pdb
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\hi1x_fj5.pdb
Size 7.5KB
Processes 2996 (csc.exe) 2548 (powershell.exe)
Type MSVC program database ver 7.00, 512*15 bytes
MD5 6f6316bb990b5e71351acb2654736a72
SHA1 092d91b2d34538e819b29d815e2ab361d00449d8
SHA256 d7d6f5ff9626436163fcee94d5a170fe857595fdae9910bc395c4d45c8744a26
CRC32 FCB1BB49
ssdeep 6:zz/BamfXllNS/Xv31mllxrS/77715KZYXxGQu+e0KpYXs3oGggksl/cEDf:zz/H1W/XvlSXS/pw2qH3RD
Yara None matched
VirusTotal Search for analysis
Name 272ab2a1ddda06d7_n5j0ib9u.out
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\n5j0ib9u.out
Size 607.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 7ff35d8b1769df5e2bdeeede4a452112
SHA1 476e92d41410260be6400f39e7c0a9f2f3f1b611
SHA256 272ab2a1ddda06d7a1aa99ffab4b4b63c65e4535fb83f390be7da0a689989abf
CRC32 F7A03E2A
ssdeep 12:K4OLM9nzR37LvXOLMQnPAE2xOLMxuKai31bIKIMBj6I5BFR5y:K+9nzd3BQnIE2nUKai31bIKIMl6I5Dvy
Yara None matched
VirusTotal Search for analysis
Name 856bded4416dd159_mobuv0cw.0.cs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\mobuv0cw.0.cs
Size 286.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text
MD5 b23df8158ffd79f95b9bddd18738270b
SHA1 79e81bb74bc53671aeabecae224f0f9fe0e3ed7f
SHA256 856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882
CRC32 0B290FEB
ssdeep 6:V/DsYLDS81zuBph+HjLmatln9MG4SRBHALRZNu8K0wHQy:V/DTLDfuBphILmyxtcZNuwy
Yara None matched
VirusTotal Search for analysis
Name 2eb424753d9cc47d_owptouvz.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\owptouvz.dll
Size 3.5KB
Processes 200 (csc.exe) 2548 (powershell.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 33a14b168eccc75ec146a957b93f58bc
SHA1 fbbf8269649a3a2b7090605b75a08ba81181f433
SHA256 2eb424753d9cc47d8fde15aa88dd078f23b3f93ce241f6e3ecd0bc079f69cfa5
CRC32 1A044EF9
ssdeep 24:etGSFNiGTnylqsanvqh9TALmzCrbdPtkZfc6eGRLumI+ycuZhNOakS2PNnq:66dqnSTAwKuJcBGRLl1ulOa3Kq
Yara
  • Is_DotNET_DLL - (no description)
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 0213c7b46a55079e_owptouvz.cmdline
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\owptouvz.cmdline
Size 311.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
MD5 f1e6813b0d4a8b561bd7619113c52878
SHA1 3e3721d4398e2cc86f7fd44d49f31ec8fa66c384
SHA256 0213c7b46a55079ef1ff4459fe5c82ca32dd40029f853df79a5be1a3a4215e37
CRC32 B6F840BE
ssdeep 6:pAu+H2LvFJDdq++bDdqBnmQpcLJ23f5H/emGsSAE2NmQpcLJ23f5HQA:p37LvXOLMRfenPAE2xOLMRwA
Yara None matched
VirusTotal Search for analysis
Name de1e023e7c93669e_CSC49C5.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\CSC49C5.tmp
Size 652.0B
Processes 2804 (csc.exe)
Type MSVC .res
MD5 56e62d7eebf8c33de6e3b4fe07f5b10d
SHA1 1ea02ec0fe83bd298f6b9570aec6b342e29cec90
SHA256 de1e023e7c93669eb901eb27599c2d375958fc4dea4a7dc2a3a2f5d641b6b991
CRC32 7C3F2EC0
ssdeep 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryUak7Ynqq6PN5Dlq5J:+RI+ycuZhNyakS6PNnqX
Yara None matched
VirusTotal Search for analysis
Name 0a913fd594ad2da3_n5j0ib9u.0.cs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\n5j0ib9u.0.cs
Size 249.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text
MD5 69ecfeb3e9a8fb7890d114ec056ffd6d
SHA1 cba5334d2ffe24c60ef793a3f6a7f08067a913db
SHA256 0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58
CRC32 C84571C8
ssdeep 6:V/DsYLDS81zuBph+HjLmatloFMG4SRT1JAnR1jvy:V/DTLDfuBphILmL5TDUR1zy
Yara None matched
VirusTotal Search for analysis
Name 209909223fd66118_hi1x_fj5.cmdline
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\hi1x_fj5.cmdline
Size 311.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
MD5 d6bb8e76e242d793895b2f20bc55ff60
SHA1 c6916088b322a7e383d27ffa063ef8e503f93ad8
SHA256 209909223fd6611830e65376e53e7144593baaa820ae91234b8428c393717c76
CRC32 416A4723
ssdeep 6:pAu+H2LvFJDdq++bDdqBnmQpcLJ23ffJemGsSAE2NmQpcLJ23fZ:p37LvXOLM3QnPAE2xOLMB
Yara None matched
VirusTotal Search for analysis
Name 53d5aecb149a00bc_hi1x_fj5.0.cs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\hi1x_fj5.0.cs
Size 272.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text
MD5 4de985ae7f625fc7a2ff3ace5a46e3c6
SHA1 935986466ba0b620860f36bf08f08721827771cb
SHA256 53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004
CRC32 6DDBA2C0
ssdeep 6:V/DsYLDS81zuBph+HjLmatlfMG4SRcBeN1jVQO1OaFFQy:V/DTLDfuBphILm4cBeN1fOaIy
Yara None matched
VirusTotal Search for analysis
Name 76296ca80ceb9d2d_sharefont.ini
Submit file
Filepath C:\Users\test22\AppData\Roaming\HNC\User\Common\80\Fonts\ShareFont.ini
Size 183.0B
Processes 2428 (Hwp.exe)
Type ASCII text, with CRLF line terminators
MD5 34766d17d04c24aaa62124eae6b5bac4
SHA1 984e092e32fe8f7bd340a7799541c2600d96a4fb
SHA256 76296ca80ceb9d2db0b4ed08ba1b060c92a75805d71978c30dd33b87bd698b6e
CRC32 E0E924A3
ssdeep 3:5xxovKdVo6LR5nE9Aj4I5tLGoW+QRX7AMWRUrNmWxpcL4EaKC5YoH1KLDTjEcKl0:5RVogR5nEk55GoW+QWMWRKNmQpcLJaZg
Yara None matched
VirusTotal Search for analysis
Name 25069dc27480e50a_owptouvz.pdb
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\owptouvz.pdb
Size 7.5KB
Processes 200 (csc.exe) 2548 (powershell.exe)
Type MSVC program database ver 7.00, 512*15 bytes
MD5 70506ef534c50daea50e6752e68278d1
SHA1 9cc9a38792e40f1b446032f00487c93df9feb1a7
SHA256 25069dc27480e50a2fce840c7397a30bccc17528c130729c8dc59aaa9abac55e
CRC32 0BA62ACD
ssdeep 6:zz/BamfXllNS/A1m11mllxrS/77715KZYXxGQu+e0KpYXz1w3oGggksl/cEDf:zz/H1W/A0fSXS/pw2qwURD
Yara None matched
VirusTotal Search for analysis
Name a9b1dc8eaa5fcd00_d93f411851d7c929.customDestinations-ms~RF1941a9f.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1941a9f.TMP
Size 7.8KB
Processes 2220 (powershell.exe) 2548 (powershell.exe)
Type data
MD5 c1d8708bab1e838a2deda26d58bb8d42
SHA1 95d39e75a804752961c139bb6c0b67f84f685035
SHA256 a9b1dc8eaa5fcd0034694cf9742ae915a5932142a1477c3ab6fada45d98750b2
CRC32 E71AF2A2
ssdeep 96:QtuC6GCPDXBqvsqvJCwoFtuC6GCPDXBqvsEHyqvJCworFS7HwxWlUVul:QtbXoFtbbHnor/xo
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name f09337f9f6ec6aed_RES4DED.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\RES4DED.tmp
Size 1.2KB
Processes 156 (cvtres.exe) 1784 (csc.exe)
Type Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x406, 9 symbols
MD5 3af6dc7fc47339867b1d5811704f2652
SHA1 74e38b24e6683895399c41bb2f5c73a60d46079f
SHA256 f09337f9f6ec6aedffc6751138196f0e523270d9df822137f75ed31aa69e5657
CRC32 D92A9568
ssdeep 24:Hi/sjJ9YernWs3mHi/UnhKLI+ycuZhNo+YGakSJ+YXPNnqjtd:CkMernX3mC8nhKL1uloIa3JHqjH
Yara None matched
VirusTotal Search for analysis
Name 08cb892b5ab33f7b_mobuv0cw.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\mobuv0cw.dll
Size 3.5KB
Processes 1784 (csc.exe) 2548 (powershell.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e8665a00a848a439e4ce5822bd517458
SHA1 5ead734f35ebf0cefbfd8be2f03fab1e69623116
SHA256 08cb892b5ab33f7b15e7af60e4a3be75b6c056ef27723e10d2cd103020111554
CRC32 74C378D5
ssdeep 24:etGS8tunmaOnfgh/hLhXOedTblqw8YVALmn7bdPtkZf3G02mumwmI+ycuZhNo+Yk:6rjpL/xBjAyuJ3GdA1uloIa3JHq
Yara
  • Is_DotNET_DLL - (no description)
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 9fe297f4fd587e32_CSC4FD0.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\CSC4FD0.tmp
Size 652.0B
Processes 200 (csc.exe)
Type MSVC .res
MD5 971a414b3e9bf9e96c17b82498ab7694
SHA1 b8121d1ad3da7c9d9ab4bc89c3bf68a6abd65a46
SHA256 9fe297f4fd587e321ace57797721b5fef0ad19e24c988d135e7bc7948d99a0ff
CRC32 64713035
ssdeep 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryP4ak7YnqqEtPN5Dlq5J:+RI+ycuZhNOakS2PNnqX
Yara None matched
VirusTotal Search for analysis
Name f1cd7e92558b52f3_hi1x_fj5.out
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\hi1x_fj5.out
Size 607.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 93a0521aec775d9ae4c7649c84abfa38
SHA1 1f8857bb37d4f0c65ae5412141ea161950807d35
SHA256 f1cd7e92558b52f3d4f4adcb049e04d9461e0d0c4f7857456b5adb3443fc86ea
CRC32 7D456A11
ssdeep 12:K4OLM9nzR37LvXOLM3QnPAE2xOLMkKai31bIKIMBj6I5BFR5y:K+9nzd3BAnIE2nkKai31bIKIMl6I5Dvy
Yara None matched
VirusTotal Search for analysis
Name d3acae37b6915593_n5j0ib9u.cmdline
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\n5j0ib9u.cmdline
Size 311.0B
Processes 2548 (powershell.exe)
Type UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
MD5 ed46e0bef40bc124e8f13606a8a5646e
SHA1 ff71ab8fad8d4f4aafdefbb2fe7cc20497aa52db
SHA256 d3acae37b691559352dc8644615aad2dc560ff2e95a86bceede2edebba1d6e5f
CRC32 BE7BD912
ssdeep 6:pAu+H2LvFJDdq++bDdqBnmQpcLJ23ftqmGsSAE2NmQpcLJ23ftPn:p37LvXOLMQnPAE2xOLMxn
Yara None matched
VirusTotal Search for analysis
Name ceb382e7314eee2c_hi1x_fj5.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\hi1x_fj5.dll
Size 3.5KB
Processes 2996 (csc.exe) 2548 (powershell.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 abfe2bc08158452056d813f278e6111f
SHA1 78a697e8b7e5489227316b11177e3929affff522
SHA256 ceb382e7314eee2c9eb71b0cf9a4127198edcdaf3037b5109a17aa0f997d0d95
CRC32 CE117BE0
ssdeep 24:etGS8t6hmSlTA0VIluJ9/etVALmpbdPtkZfgwfhAUBxhj4mI+ycuZhN8iGakSvis:6DH5HJqAsuJgehX1ul7Ga3KFq
Yara
  • Is_DotNET_DLL - (no description)
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 27150f5ce483b440_mobuv0cw.pdb
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\mobuv0cw.pdb
Size 7.5KB
Processes 1784 (csc.exe) 2548 (powershell.exe)
Type MSVC program database ver 7.00, 512*15 bytes
MD5 3883333c90270c5751cf8f95a878c29c
SHA1 8dcd8d9607f716b41e117a5da68b7bccd53d487a
SHA256 27150f5ce483b440377a1c8f214a562fc244c4ff09009bb4af03b4a8227ca633
CRC32 749EF923
ssdeep 6:zz/BamfXllNS/X8/P1mllxrS/77715KZYXxGQu+e0KpYXs6ldoGggksl/cEDf:zz/H1W/XkSXS/pw2qH0RD
Yara None matched
VirusTotal Search for analysis
Name 43986bd1a0e01e3c_3c428b1a3e5f57d887ec4b864fac5dcc
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Size 252.0B
Processes 2548 (powershell.exe)
Type data
MD5 46f2e2842977c67f80d91bd7481a33f5
SHA1 77a98fd328e153b29ddfd78e654ca6c048e351a3
SHA256 43986bd1a0e01e3c163033de2db0804e8f60290bc65b24ade089a613dfc9ead0
CRC32 407655A9
ssdeep 6:kKT8hLDcJcbjcalgRAOAUSW0zeEpV1Ew1OXISMlcV/:MLYNtWOxSW0zeYrsMlU/
Yara None matched
VirusTotal Search for analysis