Dropped Files | ZeroBOX
Name 1a9bd79f19810206_BrowserMetrics-610161BE-574.pma
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-610161BE-574.pma
Size 8.0MB
Type data
MD5 fa3170d41d56316c93501dbb70b87426
SHA1 ac0eded87a222f8e2306809c539303b665b86d16
SHA256 1a9bd79f198102063052c33ba2ebfea835de4c0523010fad06142b83405d0a77
CRC32 165373FF
ssdeep 192:eOh5KH1LepNNAfHkkqukLTQdHP6kzkQnx:eOhqLyePxkLT2pzk6
Yara None matched
VirusTotal Search for analysis
Name 5a3ec8851acd1bb6_CrashpadMetrics.pma
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma
Size 1.0MB
Type data
MD5 aea7ffdba870ea9d59d542f890fecc8c
SHA1 2efe83750eebdfacc148d376cc4edfdf8e5d2ac9
SHA256 5a3ec8851acd1bb62d270e9bdca9625da9f34df69ef39608bc2ce3de68960056
CRC32 CB7B9D10
ssdeep 12:bHiZXAVMMOKEKSCemJKlkQPdl/JG89Hy3aJ0oMFgigpCbUycIXuYJ05:bwQOMzBS+Mk0/JvWoMeigp1y5eYW
Yara None matched
VirusTotal Search for analysis
Name 6ba7cc47931205ae_BrowserMetrics-5F2CDF32-998.pma
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5F2CDF32-998.pma
Size 8.0MB
Type data
MD5 da46384c648ccc3bc125719b6c764a63
SHA1 e0ef3f8cb86cad846aa5f26d1551b6030b2a3c63
SHA256 6ba7cc47931205ae59a1f3b1fb1368c3987cdf98c0ba37eb6ccc4c37a3c917fc
CRC32 9A372833
ssdeep 6144:31TDVXkmiRsOXckF2KK4nj0Pm3FNN2MgkxaHI9UouDb8:pZAzuo9
Yara None matched
VirusTotal Search for analysis
Name 574198b31066ee1d_debug.log
Submit file
Filepath C:\Program Files (x86)\Google\Chrome\Application\debug.log
Size 198.0B
Processes 1048 (chrome.exe)
Type ASCII text
MD5 8dc8a0a9b7f3f559a6d8eaa85149e3ae
SHA1 51790faba8159d93d6e099ac0846a19a567465fe
SHA256 574198b31066ee1d48e7e0e95dc81e6ecf8ce6c908563c5163bbfc7f85666796
CRC32 7C1C48F7
ssdeep 6:qSkfahRU4LGGmm3V4v8/fahRU4LGGmm3V4vF:+ahRU4LGBm3V6MahRU4LGBm3V6F
Yara None matched
VirusTotal Search for analysis
Name 0e3dc4ccd259716b_settings.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
Size 40.0B
Processes 1396 (chrome.exe)
Type data
MD5 62325aa04f35880232330f344df8018c
SHA1 58fe9532ee8d96e8d12448408cf3ccf9d0542543
SHA256 0e3dc4ccd259716b24376fddb4ee07a6c227f8bcb2532a7dd75bb36a4290e7cc
CRC32 6F0BEA7C
ssdeep 3:FkXJRYcTUM:+wcTb
Yara None matched
VirusTotal Search for analysis
Name 6e8de7c3cf93176d_chrome_shutdown_ms.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt
Size 3.0B
Type ASCII text, with no line terminators
MD5 efb88c11527f50519fbf906915be27b3
SHA1 80d65841cfdb22467077058c36f69147e591ea8e
SHA256 6e8de7c3cf93176d45fbfca3dc9f528289717dae8d30113258d82a9bb52d2c53
CRC32 00E176C3
ssdeep 3:b:b
Yara None matched
VirusTotal Search for analysis
Name ca4205b026ac3620_b66ec25d-2e4b-436c-9642-32e2e0e27b2f.dmp
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\b66ec25d-2e4b-436c-9642-32e2e0e27b2f.dmp
Size 908.9KB
Processes 1048 (chrome.exe)
Type Mini DuMP crash report, 10 streams, Wed Jul 28 13:55:37 2021, 0x0 type
MD5 3f8b568b27f1ef32a6941bfced1e6994
SHA1 8229111c3cf605a3b0c5e12ed5dca447fb047c2d
SHA256 ca4205b026ac3620fee4b6a9cf094cf7b7e188412cb7965a415948471d5a4dd0
CRC32 5D44888F
ssdeep 3072:xY+bvDXpWwVXwCzkB/rTt3nHdm9Nzeo617PxZyZhK29bBp4tCcIurMqKtaxcteI1:bvDXVVgCzkNt3nPovFL+VW
Yara
  • Malicious_Packer_Zero - Malicious Packer
VirusTotal Search for analysis
Name f58cd7eb26c652a1_svchost.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Postman\svchost.exe
Size 191.5KB
Processes 1116 (IAF Attack Jammu.exe)
Type PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 fbe0e80bf5ff8672d214e839ad146f07
SHA1 7f480d6b8da9a23fe4dc023d169da50aeb310ace
SHA256 f58cd7eb26c652a19f1612ea7dd7f35d1c7c02c78552e6ee3baf430515ef73d9
CRC32 AAAF23E0
ssdeep 3072:NB+lXAaE6Ya1Qc8jlo1rpsC+m5bHxI+bW8:/+lXA16nac8Rqsnk
Yara
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
VirusTotal Search for analysis
Name e5fff35e54dd9507_iaf attack.pdf
Submit file
Filepath C:\Users\test22\AppData\Roaming\IAF attack.pdf
Size 198.4KB
Processes 1116 (IAF Attack Jammu.exe)
Type PDF document, version 1.4
MD5 b8704d2aba5f0ff39457f9c55e275595
SHA1 3d11f9be06cd4e001b0a462469e2e77682789c08
SHA256 e5fff35e54dd9507f3c40e2b83d567ac40a0d983aba1f065d880ff17eb94e73d
CRC32 7FECC4AA
ssdeep 6144:G9L8q93igqNbBqVwLxUdhBEYjdsCU+amYN661y5811J:G9L8q93QBqVwL+dfEiHU+ajJ/
Yara
  • PDF_Format_Z - PDF Format
VirusTotal Search for analysis
Name 8da7639330262f74_metadata
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata
Size 114.0B
Processes 1048 (chrome.exe)
Type data
MD5 b4790e569c2c5d17ff373702208d8690
SHA1 635bd99c8742c350ef212d24bb04049e1d1ba4c2
SHA256 8da7639330262f74a05382b36573e309273b44e3d2ab332d703b103bf11a5fd6
CRC32 E06F9F93
ssdeep 3:mTll+XlSLTuiPlE/lKklVlfjk6UqO2AX0XDGn:mTlESnu4lsKklHtHAX0an
Yara None matched
VirusTotal Search for analysis