Dropped Files | ZeroBOX
Name 84c8fbc0c3ec000c_recoverystore.{00660701-1af9-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{00660701-1AF9-11ED-98E1-94DE278C3274}.dat
Size 5.5KB
Processes 2480 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 9fe4db8f1c82efdc84637a1eaa79d87d
SHA1 b38822a8a527570b151b9f5104e19156c89aaca8
SHA256 84c8fbc0c3ec000cae845f594a52359283b218f9a58ee31c3c5be60bc7c3bcd5
CRC32 DAF2301E
ssdeep 24:rb/lxG5/N8CG5/N8/eKqNlWrDEhalNlWrDEJmkQaHzDl:rbbG5FJG5FueKqmrghagrgJmkQaHzDl
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 911e188862227f83_{00660702-1af9-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{00660702-1AF9-11ED-98E1-94DE278C3274}.dat
Size 4.5KB
Processes 2480 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 6101d4d17851218b9e6a058f872af3ed
SHA1 729d672db1f9ad6c5116bd8a421de5ea3254fae8
SHA256 911e188862227f8305e653253134fbf753f21503925a029787c7ed9aa62d2ac4
CRC32 7143FD13
ssdeep 12:rlxAFqrrEgm8GL7KFRXxrEgm8Gr7qsANl26abax1NlgfRbax:rhG8BXxG8WANlIoNls
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name b6f4487869d262c9_{00660704-1af9-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{00660704-1AF9-11ED-98E1-94DE278C3274}.dat
Size 3.5KB
Processes 2480 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 4dd00a8714097d1a515ad15aa54ab6f7
SHA1 c8bb87d2b53551d135a109547515dc7989706a45
SHA256 b6f4487869d262c95b570bab52a326ce3718ae6768520fc49ecd33750813c638
CRC32 973B3692
ssdeep 12:rl0oXGFiUxrEgmfB06FiDrEgmfB0qTNlz1baxAyW:r3UxG2DGxNlpxj
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 8e2c9fd68fc850fa_tag.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\tag.exe
Size 107.0KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 2ebc22860c7d9d308c018f0ffb5116ff
SHA1 78791a83f7161e58f9b7df45f9be618e9daea4cd
SHA256 8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
CRC32 8FA664BE
ssdeep 3072:bcvFBgCYCpieID9L27lqeI6QcEhpTFhM4EASNz:bcvOfYlq9zcqFhM4jS
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 39e7de847c9f731e_down[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\down[2]
Size 748.0B
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 c4f558c4c8b56858f15c09037cd6625a
SHA1 ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA256 39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
CRC32 B475DDD7
ssdeep 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name a32e0a83001d2c5d_2.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\$inst\2.tmp
Size 36.0B
Processes 2368 (WW.exe)
Type Microsoft Cabinet archive data, 36 bytes
MD5 8708699d2c73bed30a0a08d80f96d6d7
SHA1 684cb9d317146553e8c5269c8afb1539565f4f78
SHA256 a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f
CRC32 EAB67334
ssdeep 3:wDl:wDl
Yara None matched
VirusTotal Search for analysis
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 2924 (jshainx.exe)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name ef82e286e9dd9233_{00660703-1af9-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{00660703-1AF9-11ED-98E1-94DE278C3274}.dat
Size 3.5KB
Processes 2480 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 81a29eccea6071247fa1eebcef32c712
SHA1 8b64a307d76d632b835421b14c174fe539a87fe2
SHA256 ef82e286e9dd92336cefe36e72147a7a10eaf5245543a73c734dd9c7dc6034ce
CRC32 C7D5E67D
ssdeep 12:rl0oXGFiUxrEgmfB06FiDrEgmfB0qTNlz1baxAyX:r3UxG2DGxNlpxK
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 7b37ab9a53392525_{00660706-1af9-11ed-98e1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{00660706-1AF9-11ED-98E1-94DE278C3274}.dat
Size 3.5KB
Processes 2480 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 def85cd46b36019d5a9d694529ac8dfb
SHA1 bf9711ea93d2061fc8f40f34bc001212fb98a04a
SHA256 7b37ab9a5339252522ef119513d499c02dcce9b8e5060f87ea130e1c5bbc0b54
CRC32 55E65F6B
ssdeep 12:rl0oXGFuxrEgmfB06FqorEgmfB0qTNlz1baxAy0:rzxGWoGxNlpx9
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name ae76ffa6e0d211d0_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 252.0B
Processes 2924 (jshainx.exe)
Type data
MD5 cf9b3c1a465b7c6cc12bcec5d59f6cbc
SHA1 ea73fd080c4977231567a3b93603e3a7d1d3ca0d
SHA256 ae76ffa6e0d211d082986588a47e2fad9e3f8c5596bee1ea2e477bccc31a9f81
CRC32 EB736D0C
ssdeep 3:kkFklJ3l1fllXlE/VWw1BllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1ADEQcOP:kKElkWA1liBAIdQZV7CDEQcK1
Yara None matched
VirusTotal Search for analysis
Name 346696f71c43aa04_57443983847852768089485653
Submit file
Filepath C:\ProgramData\57443983847852768089485653
Size 116.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 446b5d2332a7033b68c6b18d486829a9
SHA1 6598bb268a665c1aa7045d75be0c701934f6db0b
SHA256 346696f71c43aa048108cced73179cae2a77b861c16edad3c165ba2dccb915f8
CRC32 5CCC489E
ssdeep 48:T6ptX3C7nNfVcS2+VANULn36uw5NPM5ETQTpUPxK2PIs6kJL5R2+zaSZ00LTL0oy:OfHC7n/c0VANUjwQU+KraSZ00LTL0J
Yara None matched
VirusTotal Search for analysis
Name 10fe1d7788d9a779_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\dnserror[1]
Size 5.8KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 67bbf4af23868b17115e91fc0f35b5d9
SHA1 f43e2691fa1d733fdfc6dc7c280a659af3bc8dc2
SHA256 10fe1d7788d9a779bcaaeb53f879c6254425e4b64a84b24bbbc099cd7be99058
CRC32 099D8EAD
ssdeep 48:uqUPsV4VWBXvXS4nZ1a5TI7HW/Tu21kpd87KZA9f+upbthDb6Xuzut7Cih0:uOpiEQKHT272axfnRzkh0
Yara None matched
VirusTotal Search for analysis
Name 2e7cbb274b70aa6f_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favcenter[1]
Size 687.0B
Type PNG image data, 16 x 16, 8-bit colormap, non-interlaced
MD5 79afa8ab0ff40639c6fb752e88e60ee1
SHA1 c940d08bfeb8a7012f9340c9c4821c8f59b7d38f
SHA256 2e7cbb274b70aa6f564088cb1b58029907b836e73119da8398687ae766b124c7
CRC32 55DFB61F
ssdeep 12:6v/7tWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW2cd//8NOR4JOzPi+oNoF2mcHhC2V:DWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWo
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 79516c040ffbb112_kukurzka9000.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
Size 1.4MB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8df3405e9cd1a18d10568e0d32e6dc39
SHA1 a084252242da8dbf97f23d7785fdf2b8d9677d3b
SHA256 79516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b
CRC32 3ACFF4D5
ssdeep 24576:oSXQxuKIfiJNSvHvUa+yhti4lL05AEzhKxFG/Joq2rWbmdr9y/2fp7PA7:o0V47SnUan87hy8/Joq2KmbXfpL
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • Malicious_Library_Zero - Malicious_Library
  • Network_Downloader - File Downloader
VirusTotal Search for analysis
Name 6c3c1986f231973a_noConnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\noConnect[1]
Size 5.3KB
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 7686f6957ab9b36be2ebba88772a1541
SHA1 27089f8c09e41fdc4c994f8a5a5b115058479def
SHA256 6c3c1986f231973a68ddbacfd2a40408c8766bb18851c1a80e121f08f9bcf4de
CRC32 CA869C92
ssdeep 96:x4xOKDm0AK8naEFgkQgWmwep7eyaHNdj1BQp3VaYuV5pLeOMnCi:x4xOuuK8nNFgyW3eJe9HzjfQpI5p7md
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 824fae3331b95e2f_98189224144717095355289506
Submit file
Filepath C:\ProgramData\98189224144717095355289506
Size 40.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 41c19a9e8541fcb934c13c075bf47721
SHA1 648a7622d533d79b9a0bb31dc370134ec3a75ed7
SHA256 824fae3331b95e2f88ca60c87a6c9569086906ec76fc1db8d6dee9adddc4e80c
CRC32 560F7642
ssdeep 48:+35TqYzDGF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:Ulce7mlcwilGc7Ha3f+u
Yara None matched
VirusTotal Search for analysis
Name 3c54646213638e7b_winlogson.exe
Submit file
Filepath C:\ProgramData\Dllhost\winlogson.exe
Size 5.1MB
Processes 1172 (dllhost.exe)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 2a0d26b8b02bb2d17994d2a9a38d61db
SHA1 889a9cb0a044c1f675e63ea6ea065a8cf914e2ab
SHA256 3c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1
CRC32 D609450F
ssdeep 98304:jZlzjjErvvBIvXFYUxGgrrHWbQuaX6s1dICNSCcKxzLOpB:rjjAbQDX6nCNSjCKp
Yara
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • IsPE64 - (no description)
  • Malicious_Packer_Zero - Malicious Packer
VirusTotal Search for analysis
Name f86fe4ca1b994700_temp_0.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\$inst\temp_0.tmp
Size 1.5MB
Processes 2368 (WW.exe)
Type Microsoft Cabinet archive data, 1581374 bytes, 10 files
MD5 0e0cf9114446aafd4d666ef4b5a5981c
SHA1 00bc25207f79c2426d64205f5d23889102a65478
SHA256 f86fe4ca1b994700dae2765b7d19f2d3af467260d2c800755bfb8b002fd97a9a
CRC32 DFFA54DC
ssdeep 49152:rNpJc7YkpwL/n/HnBx5DN6cGLHAVQ86rDH:Nc8kgHnN2P
Yara None matched
VirusTotal Search for analysis
Name 84c7458316adf099_jshainx.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\jshainx.exe
Size 107.0KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 2647a5be31a41a39bf2497125018dbce
SHA1 a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA256 84c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
CRC32 2A7440C1
ssdeep 3072:9cvFBgCYKpi8IVJFKQ6OUxuvQc0ZpDHh64EASNh:9cv+t36jo4c+Hh64jS
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name c01ed91474cdef0c_dllhost.exe
Submit file
Filepath C:\ProgramData\Dllhost\dllhost.exe
Size 951.5KB
Processes 3860 (MinecraftForge.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 2f65aa26f19b301f51a2d954f1c26821
SHA1 63acc00e697efdeaa57f7657e6d95758173e482e
SHA256 c01ed91474cdef0cd5d17a6b36a41c8ebc919abc133c04af3d1f4df67dfe590d
CRC32 5F7A5C9D
ssdeep 3072:nAbAFwXDGxI5+UhQpoEkFbcSfwxV9Mx5c:nm1qxY+qFbBfwxV9Mx
Yara
  • IsPE32 - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 2a31d54ca5b61e6c_rawxdev.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\rawxdev.exe
Size 1.2MB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 919cf73749642aa08fb76e9254af5efa
SHA1 08c25ab3572b9035496aec516342e37a25a84883
SHA256 2a31d54ca5b61e6c51c9fb64f3c8d7f081ccd9f5bf525396101d68c3d6050db3
CRC32 E52364EA
ssdeep 24576:9DuoFhIidblMs2HgHXhSf2f7kPzZ/N608lp3F:4ovbl7HXH7kPzNil
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • PhysicalDrive_20181001 - (no description)
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name f07d918c6571f11a_f0gei.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\F0geI.exe
Size 339.0KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 501e0f6fa90340e3d7ff26f276cd582e
SHA1 1bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256 f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
CRC32 8090D5EC
ssdeep 6144:Y7v3qLsCqxXXFaNOq7trETZdZjPLUQxIAi/9xlNtQ/3N:Y7vbfQOkrETZdZjPv10RNk
Yara
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient[1]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 5ac38599602ea405_10676501087104163341812055
Submit file
Filepath C:\ProgramData\10676501087104163341812055
Size 36.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 fc7f547105f70363ae4555407e11909d
SHA1 bb61e033d2fc6544faf841499dff1e1bba06a080
SHA256 5ac38599602ea405d981edb457a5da893debf69ae3271b671135ce03e683db04
CRC32 FA691786
ssdeep 24:TLc80RlPbXaFpEO5bNmISHdL6UwcOxv7SBl:T4LOpEO5J/KdGU1E2z
Yara None matched
VirusTotal Search for analysis
Name 1aa3fdc24e789b01_namdoitntn.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
Size 107.0KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 bbd8ea73b7626e0ca5b91d355df39b7f
SHA1 66e298653beb7f652eb44922010910ced6242879
SHA256 1aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
CRC32 2F4AA4DE
ssdeep 3072:NcvFB4CYHpiVIlf0By1C+4IQclHbTTh/4EASNB:NcvGt91Cdxc9Th/4jS
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 6de598428c334097_IE9CompatViewList[1].xml
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\IE9CompatViewList[1].xml
Size 141.7KB
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 c236e316e1b9ac60ce15dac7bcb8b2de
SHA1 1e240ed5f7cbc3dc8cd2397c7151a0d7e5f173c2
SHA256 6de598428c334097a21eb2dd5963c190fc5f80a6289bce205ded0466393745a4
CRC32 8B345ADA
ssdeep 3072:toSMrEDL1FwhdFFaz6l8vHG+TbFPAzepobjyG7I1K1IB2+Tir8v1IG9aIedyPcFC:mSMrEDL1FwhdFFaz6l8vHG+TbFPAzepR
Yara None matched
VirusTotal Search for analysis
Name ccd962957659555a_real.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\real.exe
Size 282.0KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 474861050e6a7b65bc4521096cb05454
SHA1 4e1aabe27598171a89c219aab860b325a4358b22
SHA256 ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
CRC32 5171B687
ssdeep 6144:XDuixezalqxI4u7KxFcxOVdIUYQHjW/Kn:qixezalqH9cUVdIUYQHj
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 06fce454b964f8a6_56696201433878455562825405
Submit file
Filepath C:\ProgramData\56696201433878455562825405
Size 80.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 7c9e768ab93f73497a35470de07c2ada
SHA1 5c2bb051e15ed92187bad616d489ada38e34e04b
SHA256 06fce454b964f8a6dd0bc941a34ac0054159a400be65f3d9b6a1cd76668c01be
CRC32 6849234A
ssdeep 96:JBc7fYLKYZCIdE8XwUWaPdUDg738Hsa/NhuK0l0q8oc5PyWTJereWb3lxzasq9uE:JBPOUNlCTJMb3rEDFAl67/
Yara None matched
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 2b058754c1b4402c_minecraftforge.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\MinecraftForge.exe
Size 71.5KB
Processes 2924 (jshainx.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 f8370d132f334be6703ce54b08db1578
SHA1 55d98f702724f25535bfbeb7a46cee92d57a4421
SHA256 2b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6
CRC32 F9972924
ssdeep 1536:LM3+q8B0AnmkaCapwyXMakbBjizyzFlIL:LY+qyRmf7pwyXMJbBjizyzFl2
Yara
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name 6e445a4ed5beff50_ww1.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\WW1.exe
Size 281.5KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1885946b127569cff6c03bea7175c3a0
SHA1 9bde463fc59f36f7fca6ab4d5f31b52cf979fc22
SHA256 6e445a4ed5beff50cf4935e54d2c48e25bade941378fe8fe3f0914413e90e09b
CRC32 35B91A4C
ssdeep 6144:03cWX832hSM2jGI4TIiqkv/mXp6WU69G:036ySM2ju9v/mZ6WU6
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 323b5f280e0cc6a4_d93f411851d7c929.customDestinations-ms~RF137ad1.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF137ad1.TMP
Size 7.8KB
Processes 4088 (powershell.exe) 2468 (powershell.exe)
Type data
MD5 ad31401033322e12835dc1be65f9e315
SHA1 c6512b22f2dcd70276a61ab047c7b47a54b4f32f
SHA256 323b5f280e0cc6a4fcf14f8e440a4aeabd70fbf1b690f035226d76ea5f5c0383
CRC32 E38E6B15
ssdeep 96:gtuCOGCPDXBqvsqvJCwoVtuCOGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:gtvXoVtvbHnorrxQ
Yara
  • Generic_Malware_Zero - Generic Malware
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name d3fb9c24b34c1139_safert44.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\safert44.exe
Size 246.0KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 414ffd7094c0f50662ffa508ca43b7d0
SHA1 6ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256 d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
CRC32 5A23EA3A
ssdeep 6144:i35DsWXcPE0JmESvS85n/f+jEaZfdSsbArGx/KjObJguq:f3KvF5n/f+jEaZfdSsbArGx/KjObJgv
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • ConfuserEx_Zero - Confuser .NET
VirusTotal Search for analysis
Name 713eeb4e9271fe4b_ffnameedit.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
Size 107.0KB
Processes 2368 (WW.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 4bf892a854af9af2802f526837819f6e
SHA1 09f2e9938466e74a67368ecd613efdc57f80c30b
SHA256 713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
CRC32 D6DDBCD8
ssdeep 3072:zcvFBYCY+piqI+Tg6h4MLkKUQc7b9fDWhB4EASNB:zcvmvI4MoKtcJWhB4jS
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
VirusTotal Search for analysis
Name a866ae7f0f1b8648_config.json
Submit file
Filepath C:\ProgramData\SystemFiles\config.json
Size 309.0B
Processes 1172 (dllhost.exe)
Type ASCII text, with CRLF line terminators
MD5 391e2721b94b00e97e4b1406cd69df8e
SHA1 833a33e6b995500a674529a42f513856e557b4d5
SHA256 a866ae7f0f1b8648a97e1f1e4cd993309717f4525ccc6046daf88644f717f787
CRC32 3838AE76
ssdeep 6:h3T6tyHuMRwg5p+/6m17iHKsIdm7wsUcPboTrFshfGB3Qvm1aEcZ+8MI9:h3T6tyHdpq6mMHikIFs5G2vm0EG+8T
Yara None matched
VirusTotal Search for analysis
Name 18ae9d76727c45a5_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\errorPageStrings[1]
Size 2.0KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 867666e4f73a755e0c135ce4e90de230
SHA1 a7b1d23f1d2ef9de6b149925147d44076e17fcb3
SHA256 18ae9d76727c45a577073bfc8d8914fedccfcf43b5afeeaf26737448712334e3
CRC32 D8C63FA6
ssdeep 48:z9UUiqu6xl8W22751dwvRHERyRyntQRXP6KtU5SwVze/6e/+Ng7FU50U5ZF0:z9UUiqRxqH211CvRHERyRyntQRXP6C8o
Yara None matched
VirusTotal Search for analysis
Name 9b8144e93a03858d_sys_rh.bin
Submit file
Filepath C:\ProgramData\sys_rh.bin
Size 1.5KB
Processes 3860 (MinecraftForge.exe)
Type ASCII text, with CRLF line terminators
MD5 0cdf43198d2721395850bbe27d83391f
SHA1 4d80abbc82b8ab42e0e798e61e2778445d2c2a1c
SHA256 9b8144e93a03858de025bd01b0bb5d6c757da4ec91343a5a2a8e3832606cea01
CRC32 3120DDC6
ssdeep 48:em9KRCGfFVcuXDmhddjIkVD8WcjH39CTA:59H+XDmbikVDFcD39Cc
Yara None matched
VirusTotal Search for analysis
Name 8d018639281b33da_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\ErrorPageTemplate[1]
Size 2.1KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1 f4eda06901edb98633a686b11d02f4925f827bf0
SHA256 8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
CRC32 E6FF242A
ssdeep 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
Yara None matched
VirusTotal Search for analysis