Dropped Files | ZeroBOX
Name e3b0c44298fc1c14_nsoF184.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nsoF184.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 1964 (i0.tmp)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name 31b4234965ffbff8_abc.bat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nsdF195.tmp\abc.bat
Size 735.0B
Processes 2580 (vpn-1002.exe)
Type DOS batch file, ASCII text, with CRLF line terminators
MD5 f79d850a439815f276773a85f654511d
SHA1 42c4b202b7122ce48bb17975cf0a5be337d09fec
SHA256 31b4234965ffbff8d8a2d9dc8876d2edb1ba4eb44f482fedad5ed16284f872ff
CRC32 E3745844
ssdeep 12:/kCX80qJKeV5NO980qJKeP8W/C80qJKeEBS8YGCiZL+MUAwJKeXB:Mejy5NojALkj11RL+MUGWB
Yara None matched
VirusTotal Search for analysis
Name 2f2f5825588cd631_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 252.0B
Processes 1964 (i0.tmp)
Type data
MD5 3f8575b6ecda72f1f68cc10097e4dfe8
SHA1 330b38d0923582feeadd52a21dcc15ba632b6c40
SHA256 2f2f5825588cd631b5115f5be6e619de5beb2c68c0423b6d1eb17244854870f6
CRC32 4CF00D8B
ssdeep 3:kkFklDxM/kXfllXlE/E/KRkzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB8V7l3:kK8K/AxliBAIdQZV7I7kc3
Yara None matched
VirusTotal Search for analysis
Name b7c225ef3cc3e875_d93f411851d7c929.customDestinations-ms~RF37f10b.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF37f10b.TMP
Size 7.8KB
Processes 2768 (powershell.exe) 2880 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 72f7dbc5502cfce6_i0.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-KC25S.tmp\i0.tmp
Size 3.1MB
Processes 3000 (i0.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 bdf5432c7470916ab3c25f031c4c8d76
SHA1 4762eeae811cfad7449a3d13fb1d759932c6d764
SHA256 72f7dbc5502cfce6de9184df4466a84fbbaa828048a183b0eb1690e79c886903
CRC32 FE483E2A
ssdeep 49152:SWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTb9333TZJ:etLutqgwh4NYxtJpkxhGm333Tv
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 85e03805f90f7225_INetC.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nsdF195.tmp\INetC.dll
Size 25.0KB
Processes 2580 (vpn-1002.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 40d7eca32b2f4d29db98715dd45bfac5
SHA1 124df3f617f562e46095776454e1c0c7bb791cc7
SHA256 85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
CRC32 61C1A751
ssdeep 384:pjj9e9dE95XD+iTx58Y5oMM3O9MEoLr1VcQZ/ZwcSyekMRlZ4L4:dAvE90GuY2tO93oLrJRM7Z4E
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 388a796580234efc__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-0UMDM.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 1964 (i0.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
CRC32 2CDCC338
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name d42c001c3cf58d27_i0.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\i0.exe
Size 3.5MB
Processes 2880 (powershell.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b80362872ea704846e892f16aab924c3
SHA1 222b36b97d7978929c6fd2d3b1ff8bd8504a5a33
SHA256 d42c001c3cf58d276a5bf52eb8a56158343676a18952b94d6de8c1e8127bf91e
CRC32 09B5995E
ssdeep 98304:pkLlJELlBol4ULw5Mi4JKgJqqNS0VeVxL5LoUo2qudpor:qleLY+/jgVNKvvoPr
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis