Dropped Files | ZeroBOX
Name 3a32c9525d52c652_dialogistic.hed
Submit file
Filepath C:\Users\test22\AppData\Roaming\dialogistic.Hed
Size 417.6KB
Processes 2780 (powershell.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 4e917c8b24682066dbe80531cc828ffe
SHA1 53e995a4ffd2402fa68427b3211c4fc8c46d3758
SHA256 3a32c9525d52c652a0aaf77fa5cd1e47ef536a11c0f65ea33f961ab25c55764c
CRC32 02158B60
ssdeep 6144:abfGt4ChbVI/BNHn6OJu8bCgBeemeiFlyRvahtFJ4ESQ1yLfQbncHbG1uaFOTth/:+q4Cc/T6OdveHWahTJbS+yLmcNzt5v
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)
VirusTotal Search for analysis
Name b7c225ef3cc3e875_d93f411851d7c929.customDestinations-ms~RF93b8f4.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF93b8f4.TMP
Size 7.8KB
Processes 2780 (powershell.exe) 3036 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis