Dropped Files | ZeroBOX
Name b9baeee40e6877b0_theoryability.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP000.TMP\theoryability.exe
Size 152.8KB
Processes 2548 (theoryabilitypro.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 a9d85241b63e6e2bf9672c239abf26f9
SHA1 82d365eafcf93a55d92d6e8e9aab006c960743ec
SHA256 b9baeee40e6877b097077a2a47b6feed8ef009cbeee3cc5deea81fea93323d60
CRC32 805F2BA7
ssdeep 3072:oETiS2jHjH1jJF26LXVti4ldCPLqSdcn0R:Pn2jpf2Ki4ldkR
Yara
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 35432b785a1ef3ff_theoryabiility.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP000.TMP\theoryabiility.exe
Size 151.3KB
Processes 2548 (theoryabilitypro.exe)
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5 86910733a8d8873805eb05ffd0caa3f8
SHA1 ce784b7e5eaf93b59342aee9fcd3539d0a3fefd2
SHA256 35432b785a1ef3ff0b3e6c30e5de4a7583379136287746111a287dcabeae5631
CRC32 56BB7540
ssdeep 1536:wUiQrAt3ZPfR2MpHk8hvznoNldCPLvUHbxO93iH3iS0kg:wUzEjppLgldCPLqFYcn0R
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis