Dropped Files | ZeroBOX
Name 39e7de847c9f731e_down[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\down[2]
Size 748.0B
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 c4f558c4c8b56858f15c09037cd6625a
SHA1 ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA256 39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
CRC32 B475DDD7
ssdeep 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name a32e0a83001d2c5d_2.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\$inst\2.tmp
Size 36.0B
Processes 2384 (22.exe)
Type Microsoft Cabinet archive data, 36 bytes
MD5 8708699d2c73bed30a0a08d80f96d6d7
SHA1 684cb9d317146553e8c5269c8afb1539565f4f78
SHA256 a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f
CRC32 EAB67334
ssdeep 3:wDl:wDl
Yara None matched
VirusTotal Search for analysis
Name 86aeac2a4ee8e622_safert44.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\safert44.exe
Size 244.5KB
Processes 2384 (22.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 dbe947674ea388b565ae135a09cc6638
SHA1 ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA256 86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
CRC32 725EB7FF
ssdeep 6144:up3Ja5x20VGgvErTAGx+v8ZfOmCWpbR7xVn8fvu3mRYGg5xibAq:upZlOvGTAGx+v8ZfOmCWpbR7xVn8fvu0
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • ConfuserEx_Zero - Confuser .NET
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name d60263a1bcb5cac7_btc wallet.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\BTC Wallet.exe
Size 687.5KB
Processes 2384 (22.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 2926a75bb022e2c66c2174c298ae58e5
SHA1 2e820037e6b1f63ffab578dda221616336a31b50
SHA256 d60263a1bcb5cac70c4117b814a8ea062b34cf597ef9426aacbc57f5d59decb3
CRC32 6C870555
ssdeep 12288:EPBKPWDW9DlcgUwj/FCsBfPIP7KY1rU/IV:EwYrbc/FxZi0
Yara
  • IsPE32 - (no description)
  • Win_Trojan_AgentTesla_IN_Zero - Win Trojan AgentTesla
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 700cf71aba3b31fe_{532914a2-0631-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{532914A2-0631-11ED-98E1-94DE278C3274}.dat
Size 4.5KB
Processes 2464 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 4f92b244dcf490b2bfb9c4c7a042c87c
SHA1 6c808019818ebc1348d43f45bfe203e2da01121a
SHA256 700cf71aba3b31fef63bfd4e80f2de157d6f858055ccc5b7eb1f50b5630ddb18
CRC32 518A7757
ssdeep 12:rlxAFqKrrEgm8GL7KF/l/xrEgm8Gr7qsANl26abax1NlgfRbax:rROG8FxG8WANlIoNls
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 8635d39fcaf52f60_{532914a3-0631-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{532914A3-0631-11ED-98E1-94DE278C3274}.dat
Size 3.5KB
Processes 2464 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 3ab6747e72a3def6a6b042d5a5cb6d45
SHA1 d5bf6c291011f4d318b127b66747cebc9b6caee6
SHA256 8635d39fcaf52f60e59eb0c56a3bb82c638806ea448da08f9234ac7000490062
CRC32 019D25F2
ssdeep 12:rl0oXGF9uzWxrEgmfB06FrlOrEgmfB0qTNlz1baxAyw0J:r+uixGgGxNlpx7w
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 033b2c90ff62e4c4_recoverystore.{532914a1-0631-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{532914A1-0631-11ED-98E1-94DE278C3274}.dat
Size 5.0KB
Processes 2464 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 f1e25c9da82862a18a623ca441ce52c6
SHA1 8fccd176dd8c5eb53a72be002f87b802aa5b5361
SHA256 033b2c90ff62e4c47d3affa2e53890c67fa42b849a56b306049debfbefabd894
CRC32 BE6950DF
ssdeep 24:r6xGw/B8VJGw/B87QO8idO8ibNlWv+PKLvtc:rwGw5QJGw5qQOfOsv+PKLvtc
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 10fe1d7788d9a779_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\dnserror[1]
Size 5.8KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 67bbf4af23868b17115e91fc0f35b5d9
SHA1 f43e2691fa1d733fdfc6dc7c280a659af3bc8dc2
SHA256 10fe1d7788d9a779bcaaeb53f879c6254425e4b64a84b24bbbc099cd7be99058
CRC32 099D8EAD
ssdeep 48:uqUPsV4VWBXvXS4nZ1a5TI7HW/Tu21kpd87KZA9f+upbthDb6Xuzut7Cih0:uOpiEQKHT272axfnRzkh0
Yara None matched
VirusTotal Search for analysis
Name 2e7cbb274b70aa6f_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favcenter[1]
Size 687.0B
Type PNG image data, 16 x 16, 8-bit colormap, non-interlaced
MD5 79afa8ab0ff40639c6fb752e88e60ee1
SHA1 c940d08bfeb8a7012f9340c9c4821c8f59b7d38f
SHA256 2e7cbb274b70aa6f564088cb1b58029907b836e73119da8398687ae766b124c7
CRC32 55DFB61F
ssdeep 12:6v/7tWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW2cd//8NOR4JOzPi+oNoF2mcHhC2V:DWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWo
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 6c3c1986f231973a_noConnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\noConnect[1]
Size 5.3KB
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 7686f6957ab9b36be2ebba88772a1541
SHA1 27089f8c09e41fdc4c994f8a5a5b115058479def
SHA256 6c3c1986f231973a68ddbacfd2a40408c8766bb18851c1a80e121f08f9bcf4de
CRC32 CA869C92
ssdeep 96:x4xOKDm0AK8naEFgkQgWmwep7eyaHNdj1BQp3VaYuV5pLeOMnCi:x4xOuuK8nNFgyW3eJe9HzjfQpI5p7md
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 53b716a9aa4e9977_{532914a4-0631-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{532914A4-0631-11ED-98E1-94DE278C3274}.dat
Size 3.5KB
Processes 2464 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 eff1cb4933dc12b8e241749bc4c23a63
SHA1 bee7de0091d8d2e20b9cdaead1467e07b6448b11
SHA256 53b716a9aa4e997762adf0dbe23678188071a0269fd3ec028961fad135e0f51f
CRC32 D2EAD613
ssdeep 12:rl0oXGFOH5WxrEgmfB06FwlOrEgmfB0qTNlz1baxAym:rJIxGDGxNlpxT
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 0b07732ad94780ab_f0gei.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\F0geI.exe
Size 7.0MB
Processes 2384 (22.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 174085ba0f578dd66c6e578c8b0958a7
SHA1 43afd68216f80ce1191ea04529e71cf0638003c4
SHA256 0b07732ad94780abf2ba694b0b5adb033a4ecd515e3367d68be2656fbcbbd1ee
CRC32 A908289B
ssdeep 196608:SQt/3jdTAWbYQ6LHUMtYR17xpgQo7yKzH2LA9l:Su/lAWbJkUOYr9ppyHr9l
Yara
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name b064af166491cb30_namdoitntn.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
Size 245.0KB
Processes 2384 (22.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 b16134159e66a72fb36d93bc703b4188
SHA1 e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256 b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
CRC32 187720F9
ssdeep 6144:FeDInh+hYeh4SvI1GVunpWKIPch3ErQbVIE2aq:xh+hYeNveGVunpWKIPch3ErQbVIE27
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • ConfuserEx_Zero - Confuser .NET
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 542a2454e7a48d16_uninstall.ini
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\Uninstall.ini
Size 2.9KB
Processes 2384 (22.exe)
Type ISO-8859 text, with CRLF line terminators
MD5 12f1c56b0778f3e598949fc3bc1057bd
SHA1 0eb8fab7f4ecf07c730488ed1fad2fd859400595
SHA256 542a2454e7a48d1652298d469a0a7ffe97fa14979d0da4e4bd7ea1cd6cc560f2
CRC32 01762243
ssdeep 48:Rt5W0e3bMCj9z39zH9394989zC9r9R98929F995959Z9Y9G9G17eHdGVydsJvM05:bvO5xBNW6AxT6g39LLr2BxNVJJvqwPb
Yara None matched
VirusTotal Search for analysis
Name ed0a04b95bcf1bae_txt1080.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\txt1080.exe
Size 107.0KB
Processes 2384 (22.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 16e14b9423cefdd43e7d24261280c166
SHA1 55b031a1eff19c6ae13662dd308922a84a93afa4
SHA256 ed0a04b95bcf1bae7144d6074012d2164f9b355d5b30a837ea4d7e1af41004be
CRC32 1B0FB37F
ssdeep 3072:WcvFBgCYepitIdKMuwyHFxNfXQcgJjhsh24EASNb:Wcve+zyHJYcOsh24jS
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient[1]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 6de598428c334097_IE9CompatViewList[1].xml
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\IE9CompatViewList[1].xml
Size 141.7KB
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 c236e316e1b9ac60ce15dac7bcb8b2de
SHA1 1e240ed5f7cbc3dc8cd2397c7151a0d7e5f173c2
SHA256 6de598428c334097a21eb2dd5963c190fc5f80a6289bce205ded0466393745a4
CRC32 8B345ADA
ssdeep 3072:toSMrEDL1FwhdFFaz6l8vHG+TbFPAzepobjyG7I1K1IB2+Tir8v1IG9aIedyPcFC:mSMrEDL1FwhdFFaz6l8vHG+TbFPAzepR
Yara None matched
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name b3a3c03a2b140d4f_uninstall.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\Uninstall.exe
Size 97.6KB
Processes 2384 (22.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 56b3225c7b1d6f05b4ba4ba7b4ce2202
SHA1 27c0ed1a6d25a68a48950a7ede29d87e1f2b1461
SHA256 b3a3c03a2b140d4fbe9bac4416866210d014da4c64355b395715f2d4c2506c46
CRC32 6DE3DA1A
ssdeep 1536:zO/z6hPABUjO/Zd1716EoLiL4l1HdIaqQPDm0xK8i6f0Zn9PRVW8sW45o75M:kzgjO/Zd1RePDmZ8tf05iW4u1M
Yara
  • IsPE32 - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 18ae9d76727c45a5_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\errorPageStrings[1]
Size 2.0KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 867666e4f73a755e0c135ce4e90de230
SHA1 a7b1d23f1d2ef9de6b149925147d44076e17fcb3
SHA256 18ae9d76727c45a577073bfc8d8914fedccfcf43b5afeeaf26737448712334e3
CRC32 D8C63FA6
ssdeep 48:z9UUiqu6xl8W22751dwvRHERyRyntQRXP6KtU5SwVze/6e/+Ng7FU50U5ZF0:z9UUiqRxqH211CvRHERyRyntQRXP6C8o
Yara None matched
VirusTotal Search for analysis
Name 6184fbd76073bb05_tag12312341.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\tag12312341.exe
Size 107.0KB
Processes 2384 (22.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 a30df12f813ed2ad217a174ffdc6bfb3
SHA1 99b75f5f6875faca9774f600096c8591a1b122db
SHA256 6184fbd76073bb0574ddc44fee309a52c6ef7d435f0d92f9c794f04c7ef6c9e6
CRC32 3FCA1C41
ssdeep 3072:+cvFBwCYCpivI7Lj7lliuQf7cy99TdhX4EASNA:+cv+EVli1zccdhX4jS
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 8d018639281b33da_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\ErrorPageTemplate[1]
Size 2.1KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1 f4eda06901edb98633a686b11d02f4925f827bf0
SHA256 8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
CRC32 E6FF242A
ssdeep 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
Yara None matched
VirusTotal Search for analysis
Name 17ab1eb8c0d92d3a_temp_0.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\$inst\temp_0.tmp
Size 7.2MB
Processes 2384 (22.exe)
Type Microsoft Cabinet archive data, 7530330 bytes, 7 files
MD5 41c69ca4de32534dad9b8723e271f633
SHA1 cfef4dc0a6344a08ff2da01661294f7d00858889
SHA256 17ab1eb8c0d92d3aea08def253c9d54d6cccfd839769c59741564302092ec8ae
CRC32 2698AE82
ssdeep 196608:35gXOfQdUa0xAE/JKuw3y/s7YMPqo60OpKVtO2khzdhx7WEiNQbo:JgXOf0Ua0xEuwi/s7YoqFFpYUzB7WEOH
Yara None matched
VirusTotal Search for analysis