Dropped Files | ZeroBOX
Name a770ecba3b08bbab_freebl3.dll
Submit file
Filepath C:\ProgramData\freebl3.dll
Size 326.5KB
Processes 2492 (FLP_5012_306_171.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 ef2834ac4ee7d6724f255beaf527e635
SHA1 5be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256 a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
CRC32 B698D0CA
ssdeep 6144:C8YBC2NpfYjGg7t5xb7WOBOLFwh8yGHrIrvqqDL6XPowD:CbG7F35BVh8yIZqn65D
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 6ec867dc1caa77ec_temp
Submit file
Filepath C:\ProgramData\480017077479090\temp
Size 18.0KB
Type SQLite 3.x database, last written using SQLite version 3021000
MD5 f3a100cba30b2a07a7af8886e439024e
SHA1 a454cca0db028b4d0fb29fa932c9056519efe2cf
SHA256 6ec867dc1caa77ecfd8e457d464b6bebc3be8694b4c88734fa83d197c0b214cc
CRC32 72CF6AF8
ssdeep 24:LLI10KL7G0TMJHUyyJtmCm0XKY6lOKQAE9V8MffD4fOzeCmly6Uwc6KaW:oz+JH3yJUheCVE9V8MX0PFlNU1faW
Yara None matched
VirusTotal Search for analysis
Name 5ac7bd0e4e996672__4800170774.zip
Submit file
Filepath C:\ProgramData\480017077479090\_4800170774.zip
Size 10.5KB
Processes 2492 (FLP_5012_306_171.exe)
Type Zip archive data, at least v2.0 to extract
MD5 98e4e8496b1fe1bb8ac1014ea6b69b74
SHA1 5e814cffc4211db2deb828b832765995a622a54c
SHA256 5ac7bd0e4e996672e77ce788f94a9bf1385b0abc68fb5c3faea2e3501831532e
CRC32 1230EA6E
ssdeep 192:hQbG5s2l9OboXWBuuvROOBKfP6xUAiOYDONY8NjV7ZM3QaV3BRka3:hQUlMIw0OwnQUAiBOewpNIQaVR2a3
Yara None matched
VirusTotal Search for analysis
Name c40bb03199a2054d_vcruntime140.dll
Submit file
Filepath C:\ProgramData\vcruntime140.dll
Size 81.8KB
Processes 2492 (FLP_5012_306_171.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 7587bf9cb4147022cd5681b015183046
SHA1 f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256 c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
CRC32 9BB5124B
ssdeep 1536:AQXQNgAuCDeHFtg3uYQkDqiVsv39niI35kU2yecbVKHHwhbfugbZyk:AQXQNVDeHFtO5d/A39ie6yecbVKHHwJF
Yara
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name b3731af515b8d41e__4800170774.zip
Submit file
Filepath C:\ProgramData\480017077479090\_4800170774.zip
Size 11.0KB
Processes 2492 (FLP_5012_306_171.exe)
Type Zip archive data, at least v2.0 to extract
MD5 ea818ea7155c919529db4a875b4636ef
SHA1 f835f8c9ee11107753de80b2257cb90d0a71b57f
SHA256 b3731af515b8d41e09bb1fef2b6068c2fc56a8133ce442ccfa5471a1c385af99
CRC32 BC96A5FC
ssdeep 192:hQbG5s2l9OboXWBuuvROOBKfP6xUAiOYDONY8NjV7ZM3QaV3BRkaGV:hQUlMIw0OwnQUAiBOewpNIQaVR2aGV
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_Google Chrome_Default.txt
Empty file or file not found
Filepath C:\ProgramData\480017077479090\autofill\Google Chrome_Default.txt
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 43536adef2ddcc81_softokn3.dll
Submit file
Filepath C:\ProgramData\softokn3.dll
Size 141.5KB
Processes 2492 (FLP_5012_306_171.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a2ee53de9167bf0d6c019303b7ca84e5
SHA1 2a3c737fa1157e8483815e98b666408a18c0db42
SHA256 43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083
CRC32 760685C5
ssdeep 3072:UAf6suip+d7FEk/oJz69sFaXeu9CoT2nIVFetBWsqeFwdMIo:p6PbsF4CoT2OeU4SMB
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 3fe6b1c54b8cf28f_mozglue.dll
Submit file
Filepath C:\ProgramData\mozglue.dll
Size 134.0KB
Processes 2492 (FLP_5012_306_171.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 8f73c08a9660691143661bf7332c3c27
SHA1 37fa65dd737c50fda710fdbde89e51374d0c204a
SHA256 3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
CRC32 E28A5E21
ssdeep 3072:7Gyzk/x2Wp53pUzPoNpj/kVghp1qt/dXDyp4D2JJJvPhrSeTuk:6yQ2Wp53iO/kVghp12/dXDyyD2JJJvPR
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 16574f51785b0e2f_sqlite3.dll
Submit file
Filepath C:\ProgramData\sqlite3.dll
Size 630.5KB
Processes 2492 (FLP_5012_306_171.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 e477a96c8f2b18d6b5c27bde49c990bf
SHA1 e980c9bf41330d1e5bd04556db4646a0210f7409
SHA256 16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
CRC32 9F30A75E
ssdeep 12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
VirusTotal Search for analysis
Name 334e69ac9367f708_msvcp140.dll
Submit file
Filepath C:\ProgramData\msvcp140.dll
Size 429.8KB
Processes 2492 (FLP_5012_306_171.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 109f0f02fd37c84bfc7508d4227d7ed5
SHA1 ef7420141bb15ac334d3964082361a460bfdb975
SHA256 334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
CRC32 97BCF588
ssdeep 12288:Mlp4PwrPTlZ+/wKzY+dM+gjZ+UGhUgiW6QR7t5s03Ooc8dHkC2es9oV:Mlp4PePozGMA03Ooc8dHkC2ecI
Yara
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 3b046d30dc2e6021_temp
Submit file
Filepath C:\ProgramData\480017077479090\temp
Size 36.0KB
Type SQLite 3.x database, last written using SQLite version 3021000
MD5 e185515780e9dcb21c3262899c206308
SHA1 230714474693919d93949ab5a291f7ec02fd286f
SHA256 3b046d30dc2e6021be55d1bd47c2a92970856526c021df5de6e4ea3c4144659b
CRC32 25EF2A64
ssdeep 24:TLNg/5UcJOyTGVZTPaFpEvg3obNmCFk6Uwcc85fBvlllYu:TC/ecVTgPOpEveoJZFrU1cQBvlllY
Yara None matched
VirusTotal Search for analysis
Name bee57fc36fee5cbd_system.txt
Submit file
Filepath C:\ProgramData\480017077479090\system.txt
Size 2.1KB
Processes 2492 (FLP_5012_306_171.exe)
Type ASCII text, with CRLF line terminators
MD5 9777eded40aebe14478611df080ba1b6
SHA1 eb7da4dcaa432e9e9b66028e1f1e55becf9f458d
SHA256 bee57fc36fee5cbd2cda8a98840b357ea0b5b6bde3355acc39200712ee758e37
CRC32 131A57AD
ssdeep 48:7RU1taFFGrSzNcIl6SwHLM+YZ0352Bf5774mRNMPpX:7Re2QePVwHLMX2352Bf5774mRixX
Yara None matched
VirusTotal Search for analysis
Name 7376932014797e4b_FLP_5012_306_171.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\FLP_5012_306_171.exe
Size 379.8KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 a746c90dae245470777071a6c41dea07
SHA1 b9c256cb78dd83ff0ae5fe6755ff2e28096ff11d
SHA256 7376932014797e4b7f5a1c4776d865e1ba03cba69d9811f11a449c188157c918
CRC32 A7644412
ssdeep 3072:Tv8g28i1pUofS8ypYAxBWA3VcuVdxskmG9grayljeFKpPKV3PXuOq/R8E4c8tTLp:LTHBaQHuA36cd2kmGbP0KdXWRre2G
Yara
  • PE_Header_Zero - PE File Signature
  • Win_KeyBase_IN_Zero - Win KeyBase Keylogger
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • Win_Trojan_AgentTesla_IN_Zero - Win Trojan AgentTesla
VirusTotal Search for analysis
Name e2935b5b28550d47_nss3.dll
Submit file
Filepath C:\ProgramData\nss3.dll
Size 1.2MB
Processes 2492 (FLP_5012_306_171.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 bfac4e3c5908856ba17d41edcd455a51
SHA1 8eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256 e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
CRC32 9F24F4E3
ssdeep 24576:Sb5zzlswYNYLVJAwfpeYQ1Dw/fEE8DhSJVIVfRyAkgO6S/V/jbHpls4MSRSMxkoo:4zW5ygDwnEZIYkjgWjblMSRSMqH
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name e92a120c4ce8a12f_screenshot.jpg
Submit file
Filepath C:\ProgramData\480017077479090\screenshot.jpg
Size 21.9KB
Processes 2492 (FLP_5012_306_171.exe)
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1024x768, frames 3
MD5 416562db0982067974b7ef75e3825dda
SHA1 f1d1247084006f6c7479125a11bd7afbb6f0f64c
SHA256 e92a120c4ce8a12fe217a4c85dd347cdabf4b360194dac8419d80e97ab27d80a
CRC32 FD4D4CED
ssdeep 192:pCzay86LL5XH6Hc6OEuLL0tq7AeaWaE0RRRJASVb8Zvb/kbeaULiz:4586LL5XaHceuLkNIO8ZIbvULiz
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 38c389720b75365f_temp
Submit file
Filepath C:\ProgramData\480017077479090\temp
Size 72.0KB
Type SQLite 3.x database, last written using SQLite version 3021000
MD5 c480140ee3c5758b968b69749145128d
SHA1 035a0656bc0d1d376dfc92f75fa664bdf71b3e4d
SHA256 38c389720b75365fcb080b40f7fdc5dc4587f4c264ec4e12a22030d15709e4a9
CRC32 954A724F
ssdeep 96:f0CWo3dOEctAYyY9MsH738Hsa/NTIdE8uKIaPdUDFBlrrVY/qBOnx4yWTJereWbY:fXtd69TYndTJMb3j0
Yara None matched
VirusTotal Search for analysis