Dropped Files | ZeroBOX
Name ba92995d1296b989_invalidcert[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\invalidcert[1]
Size 4.9KB
Processes 2632 (iexplore.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 57868b56f2ae430d15693e82a827ddb5
SHA1 c72b54f285f93e0ada5d1991dd2e8d1a14aa6a0c
SHA256 ba92995d1296b989dc78b21e8c7eaadc799e91db819f3f83bfba817b28df6e4b
CRC32 6CA10D5C
ssdeep 96:UqUHCkAs5PFkiGjUpG9gHdk0iSAu5hfeGNBz1t9hS:9ULAsnkdjo2gnNBz39hS
Yara None matched
VirusTotal Search for analysis
Name 53a9969226555706_Sharefolder.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-BAPBB.tmp\Sharefolder.tmp
Size 1.0MB
Processes 620 (Sharefolder.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8f6ef423702ebc05cbda65082d75d9aa
SHA1 6d33ebe347f2146c44b38a1d09df9da5486f8838
SHA256 53a9969226555706a2ee3d0a1e455c5f4231329fe51eeb0b2e5de41195c95284
CRC32 DA3A3543
ssdeep 24576:nQYh1yLmSKrPD37zzH2A6QD/IpqggE2CfNafJyx9DQ:Z02rPD37zzH2A6SBIfNafgi
Yara
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name 3ba6f6803b773d2f_recoverystore.{53a61c1f-274f-11ec-bde1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{53A61C1F-274F-11EC-BDE1-94DE278C3274}.dat
Size 4.5KB
Processes 2064 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 5c1fe181c1e05a22c001b8469b3f8193
SHA1 043515aded8e8b246fa19703af109170995d0767
SHA256 3ba6f6803b773d2f671b34cb775cbe50ccd41e31ce1d2838feb76a8e4b53c91f
CRC32 55A4A77D
ssdeep 12:rlfF2hrEg5+IaCrI0F7+F2yorEg5+IaCrI0F7ugQNlTqbaxUsns3sZNlTqbaxUsE:rqh5/1yo5/3QNlWzW2ONlWzW26
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 21d03f19c4b1c12d_red_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\red_shield[1]
Size 3.4KB
Processes 2632 (iexplore.exe)
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 87de5d9a3403e1d7635885cbaa52389d
SHA1 50b32c5966331e3e27bef987fd1da0129423d348
SHA256 21d03f19c4b1c12db2feb8fb3a373d7e378976ecdfb64efb300204edc8947d3d
CRC32 15814E36
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTzVcxkZFd/:5SDS0tKg9E05TJcxi
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name d0ba19f5e334e60f_invalidcert[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\invalidcert[1]
Size 2.1KB
Processes 2632 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 66f441cef8801549c2f0ff12cbe752a5
SHA1 de506bfb63225b3cc084ae292d4bf98a21ae6250
SHA256 d0ba19f5e334e60fb5056bc2e05b97de09aee4db49e5e11abde482bab9c4e8fb
CRC32 13C10CC2
ssdeep 48:mPntofz4/i5DjktylVDJlObUBsBXcysTqysg2Bp5Bi8OwaBynLysTqys4Bwy/Ae:SE4a5HlVDJMbUB2XcylyNkpfi8OwgynN
Yara None matched
VirusTotal Search for analysis
Name fbc23311fb5eb53c_background_gradient_red[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\background_gradient_red[1]
Size 868.0B
Processes 2632 (iexplore.exe)
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x800, frames 3
MD5 337038e78cf3c521402fc7352bdd5ea6
SHA1 017eaf48983c31ae36b5de5de4db36bf953b3136
SHA256 fbc23311fb5eb53c73a7ca6bfc93e8fa3530b07100a128b4905f8fb7cb145b61
CRC32 C08DA614
ssdeep 24:vk9YMW80o0XxDuLHeOWXG4OZ7DAJuLHenX36n8R0O3kwd2q:M9YM3uERAq8uyJdB
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 70f316a5492848bb_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\down[1]
Size 3.3KB
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 555e83ce7f5d280d7454af334571fb25
SHA1 47f78f68d72e3d9041acc9107a6b0d665f408385
SHA256 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
CRC32 9EA3279D
ssdeep 96:/SDZ/I09Da01l+gmkyTt6Hk8nTjTnJw1Ne:/SDS0tKg9E05TPoNe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 62339796b1da68d6_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 282.0B
Processes 2632 (iexplore.exe)
Type data
MD5 b6c1d23fb36b6c01b65993f79a31b832
SHA1 1cffe3abeb3ab374cc436d1d3ab3c128ea67154f
SHA256 62339796b1da68d6f4e56811cd7fe2c65191e6d42b395d394930cff4cda9120a
CRC32 E2B1B620
ssdeep 3:kkFklBecttfllXlE/nclWbll5lzRkwWBARLNDU+ZMlKlBkvclcMlVHrGlAlR+iV5:kK7ct+Pbl3liBAIdQZVLRkPKSlLonGfK
Yara None matched
VirusTotal Search for analysis
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 2632 (iexplore.exe)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name afce792469d28568_ErrorPageTemplate[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\ErrorPageTemplate[2]
Size 2.2KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name 9c0d294c05fc1d88_kenessey.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\37-9334e-c87-3408a-1544a83382ac3\Kenessey.txt
Size 9.0B
Processes 2876 (Adam.exe)
Type ASCII text, with no line terminators
MD5 97384261b8bbf966df16e5ad509922db
SHA1 2fc42d37fee2c81d767e09fb298b70c748940f86
SHA256 9c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
CRC32 AC75BF49
ssdeep 3:KWigXn:KWigXn
Yara None matched
VirusTotal Search for analysis
Name a86f0b05faf58468_Adam.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-ME5U6.tmp\Adam.exe
Size 629.5KB
Processes 204 (Sharefolder.tmp)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 f66c458713ad1c49fab2f59ceb3abf82
SHA1 36c94c72ebc08da1e1f5b20b48c706b47c3a3f15
SHA256 a86f0b05faf5846831e59ab0cc3490df01c06318c208018edaaf20297aa5aa8a
CRC32 42E79190
ssdeep 12288:7SkKNKZvEplL965lceLRsEMiJ8WA+ZaZtz:W4s
Yara
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 5a17201ab485f52c_bedikyriji.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\37-9334e-c87-3408a-1544a83382ac3\Bedikyriji.exe
Size 710.0KB
Processes 2876 (Adam.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 39055edcfa57033065b1765cc24f45d2
SHA1 f65d90e6bdfc139062c6742e2acb3e091ee68298
SHA256 5a17201ab485f52c92d4820879bd6bbaac9e28a5c6650de1c1ffdde6b9f2e819
CRC32 47D749AA
ssdeep 12288:swOh1WH01QeqdqmOohiZENFFAAolcy3bhI5C8STfqM/e:bOfWU1f6
Yara
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 003d30e7d128c677_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\errorPageStrings[1]
Size 2.5KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name 23d43ab9db13b64f_foldershare.exe
Submit file
Filepath C:\Program Files\Uninstall Information\ZPXEDYHKNM\foldershare.exe
Size 754.0KB
Processes 2876 (Adam.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 cab181c59fd045c2d4c87f600bea3f6f
SHA1 c2914263d07b673ede585ce5230d163d03fed964
SHA256 23d43ab9db13b64f8e3c99a71d43b8df0efe9e3821a9a7980518c5be1a27c68d
CRC32 B8DA8318
ssdeep 768:GH/cs/nybQSZOgEp51LohTjatig+ssluc3PmTyLZu3YEp51LohThJtig+ps+FYce:s+87LGHaYgV0n/mTgyp7LGdJYg0NBQF
Yara
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-ME5U6.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 204 (Sharefolder.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
VirusTotal Search for analysis
Name f2afc04a24c9d89d_red_shield_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\red_shield_48[1]
Size 6.8KB
Processes 2632 (iexplore.exe)
Type PNG image data, 40 x 48, 8-bit/color RGBA, non-interlaced
MD5 f413dd8a75b81a154a1fd5e4c4a0a782
SHA1 667f7e3da51ca3417a1feb66d238466423c9487d
SHA256 f2afc04a24c9d89d3c2f0d73f8cd6fb6b65adbe333196c3f99cc7d6868847ceb
CRC32 D96BDACF
ssdeep 192:8SDS0tKg9E05Tz045xhOwZtbiFHsrC3rlTqpHbW:7JXE05d5xhOwtGsSTqpHC
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 203d7b61eac96de8_idp.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-ME5U6.tmp\idp.dll
Size 216.0KB
Processes 204 (Sharefolder.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 8f995688085bced38ba7795f60a5e1d3
SHA1 5b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
CRC32 90D9CA64
ssdeep 3072:6XHWOJd5D0ocxYF0+CT4zNHNpwZNjlhBKL/kg/0r4YLuztNJaFlCx:6G6tae7wZNOpiWP
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 9c0a5965be0cf39a_{53a61c20-274f-11ec-bde1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{53A61C20-274F-11EC-BDE1-94DE278C3274}.dat
Size 6.0KB
Processes 2064 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 ecbcb361eb4c0de1827be284de3bce4e
SHA1 1f688f30a17db72b67bbd8324bbdf5fbf4f0368f
SHA256 9c0a5965be0cf39a1ce929b01a825e6113aa0a6be91faff74b099be53c07af11
CRC32 D6207C6F
ssdeep 48:rmG3xV7y1MzzOksgMzzmBLeaMzzuMzz2//r1MzzcgMzh:xukOkmmByTn23rky
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 2927c3fa2a37a217_sekykuvyga.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\f7-e81b5-b12-928be-1eb40b84d7c26\Sekykuvyga.exe
Size 333.0KB
Processes 2876 (Adam.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 c4644ce4651d79a20de41d54fa5f8e73
SHA1 c20afeff2b40d0cf81260e3f72efebc414f5c62f
SHA256 2927c3fa2a37a217ebc24f7d3b0add8f34803ee803838f92d34c56db69b15fd5
CRC32 A075B5DD
ssdeep 6144:aBvz7Gd+OwqYb+Mfa78WNxRDXCW0B4XJ7kl0q+Vpe36keD1M:ovXGd+OxZ978WNTJ0B4XJ7kl0q+Vpe3d
Yara
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name c686babc034f53a2_green_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\green_shield[1]
Size 3.4KB
Processes 2632 (iexplore.exe)
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 254d388ce19d84a54fd44571e049e6a6
SHA1 51ca725642f679978f5880278e5cac5ca4f70fae
SHA256 c686babc034f53a24a1206019e958ba8fc879216fd7b6a4b972f188535341227
CRC32 265B0B9C
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTkN9D6ZB+:5SDS0tKg9E05TkN92ZE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 8a94163256a722ef_nicihixida.exe.config
Submit file
Filepath C:\Program Files (x86)\Microsoft Visual Studio 8\Nicihixida.exe.config
Size 1.2KB
Processes 2876 (Adam.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 98d2687aec923f98c37f7cda8de0eb19
SHA1 f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA256 8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
CRC32 2328D28C
ssdeep 24:2dZmht+SDfy4GOy4TO4q5X4tndGubyB8GRyF:ccdfy4G74TO4qN4hRN
Yara None matched
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 5918aa1e5e0aa7bb_nicihixida.exe
Submit file
Filepath C:\Program Files (x86)\Microsoft Visual Studio 8\Nicihixida.exe
Size 448.0KB
Processes 2876 (Adam.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 d231458201e20abd797238cf8b3b57f2
SHA1 bfbe1a3050704611cd08a0ac047327f8c0450d48
SHA256 5918aa1e5e0aa7bbbbea0b3509f01c86234a273f0d2f1ee330b05a121f9b07d3
CRC32 05BFD9AA
ssdeep 3072:TQwdonWP1nTl+6qH5YsVDOko6ttttttt3ctF:TQwMaTlzqH5YsVqkxtttttttU
Yara
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 388a796580234efc__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-ME5U6.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 204 (Sharefolder.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
CRC32 2CDCC338
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis