Dropped Files | ZeroBOX
Name e5c7931e871678ae_tmpC319.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpC319.tmp
Size 36.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 8e36f9cfbb4e98a1ea4cb31b1dfd18ba
SHA1 271e10b8bb5623e6552f2be568b01ae93b3e5a3a
SHA256 e5c7931e871678ae9bf44ed496a03ba8524a3d7600a44b29a60847ddda90eb86
CRC32 C73EAD8F
ssdeep 24:TLea0RlPbXaFpEO5bNmISHdL6UwcOxvyUU3Z:TYLOpEO5J/KdGU1EyU2Z
Yara None matched
VirusTotal Search for analysis
Name ea006857ffd3fc8f_task
Submit file
Filepath C:\ProgramData\59CAD89AA1\task
Size 1.7KB
Processes 2856 (123123.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 c0612bb00566ac889c7e843f21bf92a6
SHA1 e3cd2794fd5576d46da4b62c70e83e13b6f42364
SHA256 ea006857ffd3fc8fbdb885c93ff9c99059f376466b05851685efc1115443b5cd
CRC32 36D34489
ssdeep 24:2dH4+S7KnLRdipovLdMFQ/YeGlMhEMjn5pwjVgUYODOLG9RJh7h8F6wqB+thty:cbkKnLrjv5QQ/uydbQx3YODOLedqkPj
Yara None matched
VirusTotal Search for analysis
Name d335d0fca26c86ef_tmp4809.tmp.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp4809.tmp.png
Size 1.4MB
Processes 2856 (123123.exe)
Type PNG image data, 1024 x 768, 8-bit/color RGBA, non-interlaced
MD5 3f3fe4708908aa70cac3d888fd5b1b6c
SHA1 3546f462ea0956071e15080390e95900230e5461
SHA256 d335d0fca26c86efe9c393679b2eefb29959d1f365cd9457dbd6d6ffa1b0ed48
CRC32 C19E3B35
ssdeep 24576:IqUc0qLz2IB2rN4WNMwxRgyu68ph0rMtshvUtUgtGVQ22eC6lE0ps3v1:sqLJBAGej2DeG22e80+f1
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 9e6e4772050998a5_tmpA08E.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpA08E.tmp
Size 10.0B
Type ASCII text, with no line terminators
MD5 eb6b6c90251ab33cee784713c451e6d8
SHA1 451685e9efac4a6dc1fee73ec53ffb6b2c4c38b5
SHA256 9e6e4772050998a5c0dc3c61acf3dab0a7e594566171fa5746d6b62f9598efb6
CRC32 22598B08
ssdeep 3:IS:7
Yara None matched
VirusTotal Search for analysis
Name a36b9de3e27eaffb_tmpA0CF.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpA0CF.tmp
Size 969.2KB
Type data
MD5 526f9c1eb0742752c57929b61e489eff
SHA1 c92be8b4b828053f4db9379245869f4a3c4647d3
SHA256 a36b9de3e27eaffb7bdc4ac2af98b9e746c62f8c0687c60fdbb1f4b846a1f5ee
CRC32 64F164AA
ssdeep 24576:Ip0YL8XNb59DqZTxdxnFcYGaW0jUJ3V0lqGxz:IpxYXNiLdxnFz1W0QGh
Yara None matched
VirusTotal Search for analysis
Name 0b2c3a6f79db7046_123123.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\123123.exe
Size 204.0KB
Processes 2080 (@XWELOFF_LZT.exe)
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5 e9ce0b2d088a7e3b8fbee6b2293b07ed
SHA1 b8bf2575a62be5c4bfe7a474053dbce0738d06fe
SHA256 0b2c3a6f79db7046057e5a4114008001a9d64298b389d76a2a60ec9cec2757ac
CRC32 88873297
ssdeep 3072:sPijItfhl3iE3HHMrfyuq5mUF5eWEFb3AgM34udq9Y9fNgbec+1+F3t2OYD1Du5I:Lj+hlymHHrfet3Agp0q9ygbX+1RzDU8
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis
Name 079473a1752fb5e1_tmpC34E.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpC34E.tmp
Size 80.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 5f98cfac1d9c02587e0db4a6e5a20739
SHA1 be4f97d8544c22d01a1b941fe835d91ffc8a5efd
SHA256 079473a1752fb5e18f755627476b14192bb76894459f1430888e6ae3d07bd763
CRC32 B01FA20E
ssdeep 96:JBc7fYLKYZCIdE8XwUWaPdUDg738Hsa/NhuK0l0q8oc5PyWTJereWb3lxzasq9ul:JBPOUNlCTJMb3rEDFA867/
Yara None matched
VirusTotal Search for analysis
Name 85e82b9e9200e798_agiledotnetrt64.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\788086f6-8ca0-4e47-8d8a-507c7b3c79ad\AgileDotNetRT64.dll
Size 141.8KB
Processes 2876 (Stub1.exe)
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 e8641f344213ca05d8b5264b5f4e2dee
SHA1 96729e31f9b805800b2248fd22a4b53e226c8309
SHA256 85e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24
CRC32 B3B84F8F
ssdeep 3072:2vHGxvpTI1xUSnsEYVA+9yaJAUiXbNxqAmi3zGDm/8S:mmwWmrtPTj9jGq/8S
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 902ac8048c7b9929_tmpA0F3.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpA0F3.tmp
Size 829.7KB
Type data
MD5 80a96f96d5d7bdc4551090b09448a524
SHA1 4b8e33c80c289fff1678f518df23fa91f8e3f586
SHA256 902ac8048c7b9929b9548833c3972dcf8990a52b2eb6dfea4f8d7942e7529137
CRC32 01D99213
ssdeep 24576:WSfq0dW3BXkhPx8c0pH9ovmif5ilj295IrdF61ze:WSSoW3B0hpn0gx5iljkIr6Y
Yara None matched
VirusTotal Search for analysis
Name 67ee44f8cd1f0d42_tmpA0E0.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpA0E0.tmp
Size 681.3KB
Type data
MD5 7814bd21286da074e9ddf2402aae6a9e
SHA1 9c77ba1b470e7e494f6cb2b72326a45a1f69118e
SHA256 67ee44f8cd1f0d4285dd0d0752a89d833a6a40dbf53211dc9d014b6bb6d9f8db
CRC32 652EB4D3
ssdeep 12288:eMx3alBy+cRGCaf4E0b0WXcVSDClgaodBsxMXYWprlS+YWxAcF6SqL9:t3UcZ930K5DClFodBdktoAM6SqL9
Yara None matched
VirusTotal Search for analysis
Name 9a484082678fbe48_tmpA0AE.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpA0AE.tmp
Size 216.0KB
Type data
MD5 390cb843ab5dafdc6cd5b515083ce37b
SHA1 061f40615a109a5609aecbcda9d4deb826ce10f0
SHA256 9a484082678fbe48384302dfc2261c46e3b0fc9b6f948678265d463a5c50a936
CRC32 1F6A0407
ssdeep 6144:8OiohfCB2sw+JBbUOih6R7S0Ke2bn1BESgFTAAk64RrLFo2ak:8PyKGAtU364o4BESgFTTklRvi4
Yara None matched
VirusTotal Search for analysis
Name cb0c0bb382b2e5c6_windowsapps.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\WindowsApps ver6.69\WindowsApps.exe
Size 128.0MB
Processes 2876 (Stub1.exe)
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5 c94d6539342b38492c264b2373dd096a
SHA1 428ee2142cb27ae178bfff40ae9c084d8fc61809
SHA256 7e92146e0fcde514e98ff24d700d8d220bb9a6c9b8741cbec7e150ad9dbe6fce
CRC32 1507D476
ssdeep 3145728:/2/mhnYlZ9heHDfqn4krkZ+1ngqtDJE4O4bTnh:+WWfgjin4kqggoODS
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis
Name 88f9dc0b9a633e43_tmpC3A8.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpC3A8.tmp
Size 512.0KB
Type SQLite 3.x database, user version 11, last written using SQLite version 3031001
MD5 dd47ebe6866ad2ab59d0caa1de28d09e
SHA1 afdf6eb7a01bb7ef4c9d768b65abbbeae5ba2663
SHA256 88f9dc0b9a633e43c6d2c6fae136e782c15aa38c1601dcff948987f1c2a391c3
CRC32 8DEE9EEA
ssdeep 24:DQHtJl32mNVpP965hKN0MG/lZpNjCKRIaU5BnCMOkC0JCpL3FYay:DQfrbWTTTqtStLm
Yara None matched
VirusTotal Search for analysis
Name 824fae3331b95e2f_tmpC2F4.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpC2F4.tmp
Size 40.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 41c19a9e8541fcb934c13c075bf47721
SHA1 648a7622d533d79b9a0bb31dc370134ec3a75ed7
SHA256 824fae3331b95e2f88ca60c87a6c9569086906ec76fc1db8d6dee9adddc4e80c
CRC32 560F7642
ssdeep 48:+35TqYzDGF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:Ulce7mlcwilGc7Ha3f+u
Yara None matched
VirusTotal Search for analysis
Name 2b078d0ab5891a77_fa2c2c07f4d56a862adf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\FA2C2C07F4D56A862ADF
Size 196.0B
Processes 2876 (Stub1.exe)
Type ASCII text, with CRLF line terminators
MD5 2901563a717568e3da37a25eb8d4e7dc
SHA1 898b7ba1a2ceb5b33c278b890243221c4dfbf1b4
SHA256 2b078d0ab5891a7724de4554387c85782a2e94e1c28f7a01a49c7cad4c4b257c
CRC32 C7F75D5B
ssdeep 3:XttktgkC6wwRRpo2tcysP4S8uVvlH7EBHaYHZttktgkC6wwRRpo2tNd3/RVZBXWL:dhwrpoE64S/zH7SlthwrpoENXVbmL
Yara None matched
VirusTotal Search for analysis
Name b6ad1486789c8098_tmpA0DF.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpA0DF.tmp
Size 156.4KB
Type data
MD5 91357b05201eae3ab039a7392246a6d4
SHA1 562f3383c2f42d474b7280830c6fbfba74c8956a
SHA256 b6ad1486789c80988f2140a6c95e07b93b51a252dbf79f383e7f07c5bcaf4b54
CRC32 98C4AAE8
ssdeep 1536:r3DJ3HT1l9jpRI8MDBUEZ+RqXVmSZOhd4JkPka0cEhGvndA7sX9+Ajbcb5sWHxpJ:pXdjpRQFPZZxta0jd7c9fcVsaiHfGPmg
Yara None matched
VirusTotal Search for analysis
Name edcba37c26d2af51_stub1.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\Stub1.exe
Size 473.0KB
Processes 2080 (@XWELOFF_LZT.exe)
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5 81b5f1e1a01a892296aab30a2e83cf2f
SHA1 0fa46a8546247c850751b80096b8fd6358481f1d
SHA256 edcba37c26d2af51a0902d72c194d6e736f4567ee8bb64466428b9ade2f477b3
CRC32 A4329F1E
ssdeep 12288:/XQmioMIh3Ng7eGXmykPdMVduysaMJcR/V:YmhBh3NgCAmykadDsId
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis