Dropped Files | ZeroBOX
Name eef68514cef38f20_TestDumpAll.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\TestDumpAll.exe
Size 8.0KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 fb7ed42de60e8d14b02441f6b2a76fa0
SHA1 3f3367f44b8e7d2f29850886f73d187e0580a467
SHA256 eef68514cef38f206e48c5b9160358aeea375e4296810b3492d8808aafda40c5
CRC32 8FE0A957
ssdeep 96:dm14s0v1Fvs6KqnC7iyZKxKgddZjvDlPZTh+sWTgkQJJGT+RqKyC7tCEA9m:dm1onvvKqnoK/7ZTh+sSIJJqEqKPA9
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 85154113d5c93b4a_testdumpall.exe_2556.dump
Submit file
Filepath C:\Dumps\TestDumpAll.exe_2556.dump
Size 26.7MB
Processes 2556 (TestDumpAll.exe)
Type Mini DuMP crash report, 7 streams, Mon Apr 21 06:10:04 2025, 0x2 type
MD5 1f6cc4a73615e18ddb1a92ba81ff794f
SHA1 accb9b6a994f7dc4e3f32f9c4cc8f85ea3cdf566
SHA256 85154113d5c93b4a28bb1d02b5c093809e848b6a52f8e935131e1ff430f61c07
CRC32 E39645D8
ssdeep 393216:/D1pITBi3PuydgXo2CkywBrVj0qTObbuk9Vt9v0FmxS:PgBOPuNo2CkywBrVjTXOx
Yara
  • IAmTheKing_Family - IAmTheKing Family
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • Microsoft_Office_File_Downloader_Zero - Microsoft Office File Downloader
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • ASPack_Zero - ASPack packed file
  • Antivirus - Contains references to security software
  • DllRegisterServer_Zero - execute regsvr32.exe
  • Network_Downloader - File Downloader
  • Microsoft_Office_File_Zero - Microsoft Office File
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name 2a27236a03610552_srvany.exe_1284.dump
Submit file
Filepath C:\Dumps\srvany.exe_1284.dump
Size 12.3MB
Processes 2556 (TestDumpAll.exe)
Type Mini DuMP crash report, 7 streams, Mon Apr 21 06:09:59 2025, 0x2 type
MD5 0441d49b3ba9029a69d9ba327d91ae35
SHA1 f9f546c0ddd031caf9eca86b02bec4ce7cd0b7ac
SHA256 2a27236a0361055215678bfa4651a37d1787fc2f632764cee16df42f91abf1f6
CRC32 02014E90
ssdeep 196608:OEPkGMFxLwBrViME30qyaeYXbo25GpIYqlmub4:OGopwBrVi0qyGbAmFr
Yara
  • IAmTheKing_Family - IAmTheKing Family
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • ASPack_Zero - ASPack packed file
  • Antivirus - Contains references to security software
  • DllRegisterServer_Zero - execute regsvr32.exe
  • Network_Downloader - File Downloader
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name e0fc1087cb75ae9b_kmservice.exe_1436.dump
Submit file
Filepath C:\Dumps\KMService.exe_1436.dump
Size 15.7MB
Processes 2556 (TestDumpAll.exe)
Type Mini DuMP crash report, 7 streams, Mon Apr 21 06:10:01 2025, 0x2 type
MD5 285527a9056296a394d1cd250b3753f2
SHA1 34361d12a36f768cc8ce925b1b070154b6728006
SHA256 e0fc1087cb75ae9b89415c5aef6c6170ecf934cc42849748a4f4c9a673171027
CRC32 D67D476D
ssdeep 196608:71j5f9mHUWaZxi1EMZGLLwBrVtZE30q+ouMeYXboM5kpIYvlmub4:71j5sOxlMUXwBrVs0qFuIbImwr
Yara
  • IAmTheKing_Family - IAmTheKing Family
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • ASPack_Zero - ASPack packed file
  • Antivirus - Contains references to security software
  • DllRegisterServer_Zero - execute regsvr32.exe
  • Network_Downloader - File Downloader
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis