Dropped Files | ZeroBOX
Name e3b0c44298fc1c14_Run.vbs
Empty file or file not found
Filepath C:\Users\Public\Run\Run.vbs
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 5b2c34b3c4e8dd89_search_{0633ee93-d776-472f-a0ff-e1416b8b2e3a}.ico
Submit file
Filepath C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Size 4.2KB
Processes 6532 (iexplore.exe)
Type MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
MD5 da597791be3b6e732f0bc8b20e38ee62
SHA1 1125c45d285c360542027d7554a5c442288974de
SHA256 5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
CRC32 4527A2F2
ssdeep 24:suZOWcCXPRS4QAUs/KBy3TYI42Apvl6wheXpktCH2Yn4KgISQggggFpz1k9PAYHu:HBRh+sCBykteatiBn4KWi1+Ne
Yara None matched
VirusTotal Search for analysis
Name 13a5eb49f4a5f51e_microsoft.ps1
Submit file
Filepath C:\Users\Public\Microsoft.ps1
Size 837.9KB
Processes 1060 (powershell.exe)
Type ASCII text, with very long lines, with CRLF line terminators
MD5 aa00a2939f7db63d78cfa37f8eb206db
SHA1 1a127214ef52cced357d55b0e1250614deca42a1
SHA256 13a5eb49f4a5f51ebef8bc5571b4ba03969f51f8bede042b8d2693217a2b7dfd
CRC32 701D4649
ssdeep 6144:euIVZz82ZJc715GZs8Wv8y1V2mOnnZz/hr:PEZVgOL
Yara None matched
VirusTotal Search for analysis
Name fbf18ae3adfa319d_frameiconcache.dat
Submit file
Filepath C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\frameiconcache.dat
Size 9.0KB
Processes 6532 (iexplore.exe)
Type data
MD5 11c8b899c2651d14dd0d4119a9473ba8
SHA1 8e412b9d3d168475c4d004312835d4fac6ddfc69
SHA256 fbf18ae3adfa319d9a31df39f0227c5dfa14877aaa0fd16804948b0757a81bbe
CRC32 BBC35215
ssdeep 12:vcOM01QF6vEMXAt+prwMk6wNFutU/f2me0Q3iiIDwfUGM0zjfftYw4tOYIR1GQmK:vqcEMXIgrmNU27VQ3iiR20zSw4Pm4
Yara None matched
VirusTotal Search for analysis
Name 4852786d221e82f4_d93f411851d7c929.customDestinations-ms~RF19f759a.TMP
Submit file
Filepath C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF19f759a.TMP
Size 7.8KB
Processes 1060 (powershell.exe) 596 (powershell.exe)
Type data
MD5 0dcb3aeacb834027b1a1c6eab2cdf602
SHA1 230cea17acbc1489b76fc45e478cefad62cb1504
SHA256 4852786d221e82f468bff8d43b019ef0584f0e873004f0e10d6cc35e94a4db49
CRC32 66EACC8D
ssdeep 96:iPCC5wqvsqvJCwoSPCC5wqvsEHyqvJCwoAiHhFXpbeflUVR:iPLPoSPLzHnoAae2
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis