Dropped Files | ZeroBOX
Name defc6f288c7d9977_ytbmikqy.cmdline
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\ytbmikqy.cmdline
Size 188.0B
Processes 2572 (rxm.exe)
Type UTF-8 Unicode (with BOM) text, with no line terminators
MD5 5aa07d34b87c7930573ef3d1446bda03
SHA1 723c3501ce70818d0deaf676213ac855ecb115d1
SHA256 defc6f288c7d99774f7729aaf320a9dd7865cfa85e70f68359f92e0c9bbc9669
CRC32 9E498164
ssdeep 3:0HXEXA8F+H2R5BJiWR5mKWLRRmWxpcL4E2J5xAIERmBJ+iQCIFRVRMxTPImWxpcg:pAu+H2L/6K2mQpcLJ23fJGzxszImQpcg
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_ytbmikqy.err
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\ytbmikqy.err
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name ae11144f426028e5_ytbmikqy.0.cs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\ytbmikqy.0.cs
Size 8.9KB
Processes 2572 (rxm.exe)
Type C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 58b10ef6ba0da88788f1aac56ce7e2db
SHA1 48221936b98aac14ead7c4589513d074365414ec
SHA256 ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520
CRC32 07EB5779
ssdeep 96:JO1vYGpHKU5fZBDeXWuaLN0lWeCAaEjcqQDJ7iiLYkhxdP7NFa/COAoTOyt13IPw:AaGu7vpcfDFfckhxdP7NA/CxoSytSPf4
Yara None matched
VirusTotal Search for analysis
Name a6e6a2c0c13a11d4_ytbmikqy.out
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\ytbmikqy.out
Size 444.0B
Processes 2572 (rxm.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF, CR line terminators
MD5 f3f2bd9197efa74d4a2ef8b989d82cbc
SHA1 2349bec779e209b6b45052779b6d27852fc1e599
SHA256 a6e6a2c0c13a11d4a3d04c2f8363708ac7f285fe40c34d2c4b406f8a7daf10c3
CRC32 AB53694F
ssdeep 12:K4OLM9qR37L/6KQOLMUXOLM0Ka8GIKO5SBFN+y:K+9qdn6K280Ka2KoSDQy
Yara None matched
VirusTotal Search for analysis
Name ed0282f294bf516e_ytbmikqy.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\ytbmikqy.dll
Size 8.5KB
Processes 2716 (csc.exe) 2572 (rxm.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 27a39a388bc8b7a90c1ef6ffb8863aec
SHA1 ad109d67006cc785f0c8ec92ef581536412f41f6
SHA256 ed0282f294bf516e99e18555ba3971c6ee1a20ad951bed6532b7c6c3ba295c97
CRC32 BBF3F754
ssdeep 192:7xhVsIlJlHlHlHlHldlglfbflnldI4NuBazMg5MqsexP:91lJlHlHlHlHldlglfbflnlxABo5Mq/9
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 30a3feaee8d49f66_RESFC13.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\RESFC13.tmp
Size 1.3KB
Processes 2780 (cvtres.exe) 2716 (csc.exe)
Type Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols
MD5 92341b41b65e17e64ebd23e74ad7ff05
SHA1 6957c0bf73ab77e83c4aae36d851f8a5c1ab2145
SHA256 30a3feaee8d49f66ea83d1aece4ebafa4688aaf1868b00cd92143787f6bcacd7
CRC32 9C14DAC9
ssdeep 24:HrEFzW99/EVNUjwHOwrUeKnxfeI+ycuZhNQakSsPNnqw2d:Ld/2UjwFfKnxm1ulQa38qwG
Yara None matched
VirusTotal Search for analysis
Name 4bdd3e01a9e14faa_CSC1AE3A189E48E4B51A8259854D939E873.TMP
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\CSC1AE3A189E48E4B51A8259854D939E873.TMP
Size 652.0B
Processes 2716 (csc.exe)
Type MSVC .res
MD5 36347670cf024f9283ab52cfdeb3123d
SHA1 0ba38c77f8f97b9d62079e6af309b0f017788937
SHA256 4bdd3e01a9e14faa4cf79d9496e8869cdb62da997adbb17c54f48b9e6b3cf91e
CRC32 4B334BB0
ssdeep 12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryOak7YnqqsPN5Dlq5J:+RI+ycuZhNQakSsPNnqX
Yara None matched
VirusTotal Search for analysis