Dropped Files | ZeroBOX
Name 1d873fc202e0b1ef_prophetesses
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\prophetesses
Size 56.0KB
Processes 1020 (csrss.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 e2335b7a8a6c153ee28a2e9e59af1fe5
SHA1 36e68b7a9ee79c03c9c61e625ad141452661a46e
SHA256 1d873fc202e0b1efffdbf79c790a3a01632b5d1d709c116e10fa19b19a78c71c
CRC32 77ADCA5E
ssdeep 768:h6qLIP1mv7qEsY7OHSLLReWtPAMJzo5yJUcKtAHuSMzJes5Jei6EJJfJcQTcql:h6qMmv7TsY7OHSpev
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)
VirusTotal Search for analysis
Name e832f73628dd3445_autC649.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autC649.tmp
Size 282.5KB
Processes 1020 (csrss.exe)
Type data
MD5 cbab5134300511521ab4efb1209556f6
SHA1 37615bdaabb53e8c234266481acd1818d68cd280
SHA256 e832f73628dd34453a25f38c2a603e03074651612fe5cf83ce74e345ec0a426f
CRC32 E85F496A
ssdeep 6144:+fGl9rljYeBbzT+Vf9i2McxlMzexQoW7n9wt4S0NICg0q:+fGl9lxJOjESMzPbn904rhg0q
Yara None matched
VirusTotal Search for analysis
Name 37a7309f621b0b81_autC35A.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autC35A.tmp
Size 11.1KB
Processes 1020 (csrss.exe)
Type data
MD5 1d773510eb6157670f7709b79761b5c7
SHA1 ec8b6891751f3e14a264c6740a236bdf67db77fb
SHA256 37a7309f621b0b815e5592da88dbcb9c3e6c14b2897ef200784c6ba916fb9910
CRC32 6A36733C
ssdeep 192:8JWqkAkpDQTihaY1AlNvvkyFC0Eh0VijpYF3Gt3Fhvpr74r4sQhSM6l2PLqSCS:8/344iTelNESC0EKVM0g1h1FFhL1CS
Yara None matched
VirusTotal Search for analysis