Dropped Files | ZeroBOX
Name 8c6abe9dd4222659_CSC53732E046D6B4BBE802240A0596476DA.TMP
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\CSC53732E046D6B4BBE802240A0596476DA.TMP
Size 652.0B
Processes 2680 (csc.exe)
Type MSVC .res
MD5 c1a6899b139fa2eea5064e3c3b12bb1e
SHA1 001630c945000bfc5d89a10279a05a4beca4a4b5
SHA256 8c6abe9dd4222659f135742fa79fc8462227730903d36f7df4b921901b75813f
CRC32 3C473A97
ssdeep 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryYRqak7YnqqJRbPN5Dlq5J:+RI+ycuZhNEqakSfbPNnqX
Yara None matched
VirusTotal Search for analysis
Name ae11144f426028e5_wu1i2xkd.0.cs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\wu1i2xkd.0.cs
Size 8.9KB
Processes 2544 (rh.exe)
Type C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 58b10ef6ba0da88788f1aac56ce7e2db
SHA1 48221936b98aac14ead7c4589513d074365414ec
SHA256 ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520
CRC32 07EB5779
ssdeep 96:JO1vYGpHKU5fZBDeXWuaLN0lWeCAaEjcqQDJ7iiLYkhxdP7NFa/COAoTOyt13IPw:AaGu7vpcfDFfckhxdP7NA/CxoSytSPf4
Yara None matched
VirusTotal Search for analysis
Name d69c441cd09ae848_wu1i2xkd.cmdline
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\wu1i2xkd.cmdline
Size 188.0B
Processes 2544 (rh.exe)
Type UTF-8 Unicode (with BOM) text, with no line terminators
MD5 544ddcfe6a5f73d90ceb84860a23346c
SHA1 5ab8e9b5e85d3c7e4596467b85934fad3ecbb236
SHA256 d69c441cd09ae848ea67e183a7dcecde009d978dcdcbb83084dd2a20c13cd874
CRC32 A7F8563C
ssdeep 3:0HXEXA8F+H2R5BJiWR5mKWLRRmWxpcL4E2J5xAIHEBn0iQCIFRVRMxTPImWxpcLr:pAu+H2L/6K2mQpcLJ23fkB0zxszImQpu
Yara None matched
VirusTotal Search for analysis
Name 1ff0ce2bfa2d9589_wu1i2xkd.out
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\wu1i2xkd.out
Size 444.0B
Processes 2544 (rh.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF, CR line terminators
MD5 3dfb27ea2c871669159a5b72247ff934
SHA1 24d05ba4bab91f787341fb72005ef5fc76c3ddd4
SHA256 1ff0ce2bfa2d95893f572ac96aa10a334efda005e04e2191e695aa7b8e202c3e
CRC32 3E9983D9
ssdeep 12:K4OLM9qR37L/6KQOLM7XOLMXKa8GIKO5SBFN+y:K+9qdn6K2dXKa2KoSDQy
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_wu1i2xkd.err
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\wu1i2xkd.err
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 289d248e2ebc0f1a_wu1i2xkd.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\wu1i2xkd.dll
Size 8.5KB
Processes 2680 (csc.exe) 2544 (rh.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 13d07e8db5d27847027acc03c0176ec4
SHA1 ff88d16db8fe6c9cdd7ba59c4418c93320758186
SHA256 289d248e2ebc0f1aa3ade22ea234efe7c155c65f68cfc624f6161dd917e7a619
CRC32 24F57069
ssdeep 192:7xhVsIlJlHlHlHlHldlglfbflnldIlNuBa+Mg5MqHpexW:91lJlHlHlHlHldlglfbflnlEABt5MqYY
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 1d4bc7c932961436_RESF404.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\RESF404.tmp
Size 1.3KB
Processes 2748 (cvtres.exe) 2680 (csc.exe)
Type Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols
MD5 d8bc38b4981b3509415b8f221f1e59db
SHA1 f07ca9d7bfcb04722027727673c77d1322f8e8d4
SHA256 1d4bc7c932961436cf737d25361adad569ebe82c7e061a82ecdc0ec43d4a9aed
CRC32 D3394880
ssdeep 24:HAFzW99/gfsHzwrUeKnxfeI+ycuZhNEqakSfbPNnqw2d:J/gE+fKnxm1ulla3pqwG
Yara None matched
VirusTotal Search for analysis