Dropped Files | ZeroBOX
Name 368feabbbd25ff14_tmp2512.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp2512.tmp
Size 1.6KB
Processes 884 (vic.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 ec6d4a71eb5376d81e50cc493b42993e
SHA1 ddf1bcd288b64ff481b17c3379f6b7e9838e1582
SHA256 368feabbbd25ff14f83f7947fbce84b7a0ddf2e7a1f2c379b55bb98998b87c75
CRC32 03BDC1F0
ssdeep 24:2dH4+SEqCH/7IlNMFQ/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBa7tn:cbhf7IlNQQ/rydbz9I3YODOLNdq3u
Yara None matched
VirusTotal Search for analysis
Name 715eaeda3cd5a959_kxnjqvwevcxsb.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\KxnjqVwEvCXSB.exe
Size 940.0KB
Processes 884 (vic.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 390c7845c05f6d9870c2f96549467d10
SHA1 05d3fcec582fa4f40118eb7c81284e57acff52b7
SHA256 715eaeda3cd5a9592b004379ff4653da303f08d648c96161dcfbaa10696663c6
CRC32 86B65B8D
ssdeep 12288:qFyRiTB2QwkDISfLSA0mDnkrP1oHBYqUk91ITtjqwrnOxAULLF+olY0HZFXK:MrLSAsrPusTg+nOxAULwoZF
Yara
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
VirusTotal Search for analysis