Dropped Files | ZeroBOX
Name f8098a6290118f29_settings.bin
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\settings.bin
Size 40.0B
Processes 2488 (ujunkwerex.exe)
Type data
MD5 4e5e92e2369688041cc82ef9650eded2
SHA1 15e44f2f3194ee232b44e9684163b6f66472c862
SHA256 f8098a6290118f2944b9e7c842bd014377d45844379f863b00d54515a8a64b48
CRC32 C6B6460B
ssdeep 3:9bzY6oRDT6P2bfVn1:RzWDT621
Yara None matched
VirusTotal Search for analysis
Name 0bd3aac12623520c_storage.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\storage.dat
Size 319.8KB
Processes 2488 (ujunkwerex.exe)
Type data
MD5 7e8f4a764b981d5b82d1cc49d341e9c6
SHA1 d9f0685a028fb219e1a6286aefb7d6fcfc778b85
SHA256 0bd3aac12623520c4e2031c8b96b4a154702f36f97f643158e91e987d317b480
CRC32 F31C2239
ssdeep 6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
Yara None matched
VirusTotal Search for analysis
Name f3d4a9a7e9a1412a_run.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\run.dat
Size 8.0B
Processes 2488 (ujunkwerex.exe)
Type Non-ISO extended-ASCII text, with no line terminators
MD5 584d448bd9c461da6e6c3047784532bc
SHA1 43a1cd85acfd51a06160422827b856538cb3a3a8
SHA256 f3d4a9a7e9a1412aec12e079862793b768b7e4bdc6afa50d64b7d828a68e194e
CRC32 62C2059F
ssdeep 3:wE8n:wE8
Yara None matched
VirusTotal Search for analysis
Name 3cb0060d50bda122_43f3d2a06da04f9d80484f3b9fbf23ac
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\43f3d2a06da04f9d80484f3b9fbf23ac
Size 1.8MB
Processes 4656 (ujunkwerex.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 8b0d008b3c85cd307cbb8f4fccf73c6d
SHA1 3904b255fc840c214a94c6e6e657cb3ad68ca66e
SHA256 3cb0060d50bda1225363282dd94d240d40dc2898403ca6fbf6afd1b7deb4c10c
CRC32 E72BD9EE
ssdeep 12288:f8UClv46FZ65EeNk6o62xGdBg6cZv9QkR+kZ27xq340aHRS1a+bY96qMwkgh/M7I:/8KZx
Yara None matched
VirusTotal Search for analysis
Name f825dd89181e7435_d93f411851d7c929.customDestinations-ms~RF235a992.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF235a992.TMP
Size 7.8KB
Processes 4672 (powershell.exe) 8572 (powershell.exe)
Type data
MD5 61d3b003e73f968491bb9de05318fcbd
SHA1 abb40732bf72a072c5b176449fdb8f1c56383e03
SHA256 f825dd89181e743525684aff8d99cc6d78046e461147c33b6f7a182b98c58ea9
CRC32 76116DE9
ssdeep 96:wtuCiGCPDXBqvsqvJCwoNtuCiGCPDXBqvsEHyqvJCworc7HwxGlUVul:wt7XoNt7bHnorXxY
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 5347661365e7ad2c_catalog.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\catalog.dat
Size 232.0B
Processes 2488 (ujunkwerex.exe)
Type data
MD5 32d0aae13696ff7f8af33b2d22451028
SHA1 ef80c4e0db2ae8ef288027c9d3518e6950b583a4
SHA256 5347661365e7ad2c1acc27ab0d150ffa097d9246bb3626fca06989e976e8dd29
CRC32 36FCB1A3
ssdeep 6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
Yara None matched
VirusTotal Search for analysis