Dropped Files | ZeroBOX
Name 7d86f1f252ba4071_license.txt
Submit file
Filepath c:\program files (x86)\free wma to mp3 converter\license.txt
Size 2.9KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type ASCII text, with very long lines, with CRLF line terminators
MD5 9298152a5abae6d240dbbec805cab0cd
SHA1 acde007201098c89af1c5744d1de0c8f850b517c
SHA256 7d86f1f252ba4071412c91ccb840783d56186e6ed48e11a78496fc5ef11493ef
CRC32 75CD57A0
ssdeep 48:atqAprKcvuLWv2XQtd2zvdTdi6Y60XFwB8vvqQNKt8ZEscIGKThwkbOFCzyR:IqAprKcvuLWuAtd2zvdT46Y60XkYvs24
Yara None matched
VirusTotal Search for analysis
Name 2c047a11c6126211_wmatomp3.exe
Submit file
Filepath c:\program files (x86)\free wma to mp3 converter\wmatomp3.exe
Size 1.3MB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 fc1df4d5303ae0ab5d3380005eba5c24
SHA1 e30a8739741632c25d5a6b56c53e175c39ba3606
SHA256 2c047a11c6126211f6399bc465dbf7319919598d71050514f3ab57c7e6d65ff5
CRC32 327EC66C
ssdeep 24576:LTm8gBXaPFmWeFcVlQ/JPThfmgdB+DSqs3aC01aXCTGzaTF:uSFmagl8DSZaC01FTGzaB
Yara
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 70f316a5492848bb_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\down[1]
Size 3.3KB
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 555e83ce7f5d280d7454af334571fb25
SHA1 47f78f68d72e3d9041acc9107a6b0d665f408385
SHA256 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
CRC32 9EA3279D
ssdeep 96:/SDZ/I09Da01l+gmkyTt6Hk8nTjTnJw1Ne:/SDS0tKg9E05TPoNe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name cf9e1af309de242f_bass.dll
Submit file
Filepath c:\program files (x86)\free wma to mp3 converter\bass.dll
Size 96.6KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 43564b7dbdf619e28334973fbf61b29b
SHA1 7dd28aa2654e22a59c01f6e71a7a9daf386b9479
SHA256 cf9e1af309de242fe453d36c22ec86e09c5b9dc0ddcf1696510ee00f4b0b475e
CRC32 CFF4D7C0
ssdeep 1536:1AT8qBsK1Et5EFv4YW6pNJEsEnM0k4mShVytopgPTKi6mJjp8/Y:1S8qBsCEXYW6lEnhthV5pgbKi6mJ1GY
Yara
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name b50b7ac03ec6da86__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-AELM7.tmp\_isetup\_setup64.tmp
Size 5.5KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 b4604f8cd050d7933012ae4aa98e1796
SHA1 36b7d966c7f87860cd6c46096b397aa23933df8e
SHA256 b50b7ac03ec6da865bf4504c7ac1e52d9f5b67c7bcb3ec0db59fab24f1b471c5
CRC32 97139EED
ssdeep 48:SvTmfWvPcXegCWUo1vlZwrAxoONfHFZONfH3d1xCWMBgW2p3SS4k+bkg6j0K:nfkcXegjJ/ZgYNzcld1xamW2pCSKv
Yara
  • UPX_Zero - UPX packed file
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 25fbc88c7c967266_FreeWMAToMP3Converter.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-02SRI.tmp\FreeWMAToMP3Converter.tmp
Size 669.0KB
Processes 2992 (FreeWMAToMP3Converter.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 52950ac9e2b481453082f096120e355a
SHA1 159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA256 25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
CRC32 B021E44F
ssdeep 12288:L/vksLWtSNrPi37NzHDA6Y1gbl5d7Ifoz4mrNNpRpzqjxy:jvksLWtkrPi37NzHDA6Yg5dsfoTzsxy
Yara
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 3497ef5babf98e47_{f7c751e3-d58e-11ed-ac50-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F7C751E3-D58E-11ED-AC50-94DE278C3274}.dat
Size 4.5KB
Processes 2780 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 c58be3110be8be246cfd5185b4ee16fc
SHA1 18873f20d3736f310fc726e2e52277322aa0f1c4
SHA256 3497ef5babf98e479265a3df888b0cb9b429d21c4bcbb34a95d36ca721c3b8dd
CRC32 3E7AAC33
ssdeep 12:rl0ZGFprEgmfd06F5DrEgmfh0qgNNlTVbaxLNlf9baxNoqMMlV:rVGlGmNNlp+Nll6LV
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 9e9d41b9d8041338_free wma to mp3 converter.lnk
Submit file
Filepath C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Free WMA to MP3 Converter\Free WMA to MP3 Converter.lnk
Size 1.0KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Apr 7 12:55:39 2023, mtime=Fri Apr 7 12:55:39 2023, atime=Wed Jul 21 23:57:12 2010, length=1344000, window=hide
MD5 ca9f9b14684b1daa4a4fb2f127e2bee7
SHA1 41d1240bc8548a414e66f20e8b77d38046e1eebd
SHA256 9e9d41b9d8041338c186158976c896fcfd6c69d79a820340220e6e15dafe9311
CRC32 C5DAD7FE
ssdeep 12:8JuScVRAfqhcGdp8DCDSfewkvKClS+X+bjAytXkRbdpYcKCltugBNU94t2YLEPK9:8JlZuHdOEeewiKC+AytXOd1KCGUUPPy9
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 9848982787467671_unins000.dat
Submit file
Filepath C:\Program Files (x86)\Free WMA to MP3 Converter\unins000.dat
Size 2.1KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type data
MD5 aff6da9f1067e7d46172be34f5e1f8ab
SHA1 37c4e65d0943a9670bc71fe45f4acb5b446c09bb
SHA256 9848982787467671349fc7dcea1029d0ebf7f4045a681f0d81a48cadc05e9e26
CRC32 2283D6AC
ssdeep 48:5nt+A3+4/0XKXlXZXmXHX7EujYujvIumuY79f:5nnubOJlS37EucuzIumuYpf
Yara None matched
VirusTotal Search for analysis
Name 5dcc1e0a19792290__RegDLL.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-AELM7.tmp\_isetup\_RegDLL.tmp
Size 3.5KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c594b792b9c556ea62a30de541d2fb03
SHA1 69e0207515e913243b94c2d3a116d232ff79af5f
SHA256 5dcc1e0a197922907bca2c4369f778bd07ee4b1bbbdf633e987a028a314d548e
CRC32 7EFBA654
ssdeep 48:iAnz1hEU3FR/pmqBl8/QMCBaquEMx5BCwSS4k+bkguj0K:pz1eEFNcqBC/Qrex5MSKD
Yara
  • UPX_Zero - UPX packed file
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 771d3f40c5d3007b_bassenc.dll
Submit file
Filepath c:\program files (x86)\free wma to mp3 converter\bassenc.dll
Size 12.1KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 013522705cf0e82fb47ea58d9d8d9746
SHA1 cab7c2ddd64b96b0dffd6a0b673fe2623312ba4f
SHA256 771d3f40c5d3007b5d0532eae57573c336e39776055d0b463bc35d0345dfe1b9
CRC32 D0E34C39
ssdeep 384:2rPr0KjjF8ooJvUQXE3XN735kU5uptAJ6r:kLSUQUH4EuptAJC
Yara
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 003d30e7d128c677_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\errorPageStrings[1]
Size 2.5KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name 469fdfcaca047a13_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\dnserror[1]
Size 6.1KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 8c98552955cbb31ebed64742bf23349a
SHA1 e1d12cf6c84e4dca1c69421209e12237633f8e75
SHA256 469fdfcaca047a13a75283d5fd4bb96b56a28666d9df02195fdc2a4b78250539
CRC32 1A5BE0FF
ssdeep 96:uATpCAEQIgGN2P8bWF2oxrjSaFXQsgUkn:ukp4QSN2aWFFjSGXQVUkn
Yara None matched
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-AELM7.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 6976c426e3ac66d6_noConnect[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\noConnect[2]
Size 8.0KB
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 3cb8faccd5de434d415ab75c17e8fd86
SHA1 098b04b7237860874db38b22830387937aeb5073
SHA256 6976c426e3ac66d66303c114b22b2b41109a7de648ba55ffc3e5a53bd0db09e7
CRC32 F9D26F41
ssdeep 192:SSDS0tKg9E05TKPzo6BmMSpEJH8x07oLKsiF+2MxNdcNyVE:tJXE05g/uEJH8m7oLKLo2MxncUVE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name d5e937a4ca441c2b_unins000.exe
Submit file
Filepath c:\program files (x86)\free wma to mp3 converter\unins000.exe
Size 679.3KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d71a11bd93865d0d7d54da31d4dfbe9a
SHA1 10b44385b920061b84932f17cc30c2946312ae26
SHA256 d5e937a4ca441c2bcdc0465c4942b279cd066bc4f44e1146d5df4e532948595b
CRC32 66DDEF8F
ssdeep 12288:T/vksLWtSNrPi37NzHDA6Y1gbl5d7Ifoz4mrNNpRpzqjxyq:rvksLWtkrPi37NzHDA6Yg5dsfoTzsxyq
Yara
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient[2]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name afce792469d28568_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\ErrorPageTemplate[1]
Size 2.2KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name b0aa80357c3df4c3_recoverystore.{f7c751e2-d58e-11ed-ac50-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F7C751E2-D58E-11ED-AC50-94DE278C3274}.dat
Size 4.5KB
Processes 2780 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 4765c0c95496778002dad12a23ca5035
SHA1 5a46966ad2be267ad04e1002e7944258aef6c275
SHA256 b0aa80357c3df4c3b4373e95b7dc944310b6b679e5408d2b29ea676408d5cf22
CRC32 7E23100D
ssdeep 12:rlfF2FarEg5+IaCrI0F7+F2AarEg5+IaCrI0F7ugQNlTqbax39n9+9ONlTqbax3W:rqFa5/1Aa5/3QNlWQ9Q8NlWQ9Ah
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 07d07a467e4988d3_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\favcenter[1]
Size 3.3KB
Type PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
MD5 25d76ee5fb5b890f2cc022d94a42fe19
SHA1 62c180ec01ff2c30396fb1601004123f56b10d2f
SHA256 07d07a467e4988d3c377acd6dc9e53abca6b64e8fbf70f6be19d795a1619289b
CRC32 7FE3FBCC
ssdeep 96:RZ/I09Da01l+gmkyTt6Hk8nT1ny5y3iw+BT:RS0tKg9E05T1yIyw6
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name d4d4543dfb4ae90b_uninstall free wma to mp3 converter.lnk
Submit file
Filepath C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Free WMA to MP3 Converter\Uninstall Free WMA to MP3 Converter.lnk
Size 1.0KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Apr 7 12:55:39 2023, mtime=Fri Apr 7 12:55:39 2023, atime=Fri Apr 7 12:54:24 2023, length=695578, window=hide
MD5 df49c5fc26321352fa152e990ec3e2fd
SHA1 44ccff85913d5b35e02660b87c453a16c9c65571
SHA256 d4d4543dfb4ae90b867afba849c7cc8b9edd2bf2e7b69ecbb9fc6855f218a752
CRC32 C13D0BB2
ssdeep 24:8JpuHdOEeewiKCeYAytXVd1KCNbUUPPyN:8sdOHe5KP/UXVd1K4bhnyN
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 911c36f3df031db0_lame.exe
Submit file
Filepath c:\program files (x86)\free wma to mp3 converter\lame.exe
Size 567.5KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 a2b25c4a2e886789feb5ee4006e64d5c
SHA1 c9c1ef4e17730c74b708b0bd32e641c04ad4ca77
SHA256 911c36f3df031db06c2432f0d02e445990cc0d7d3c35275540d8e3010aaea64b
CRC32 0BFED28D
ssdeep 12288:k6wiDZnXZbb45BUNZ5jwkWicBex7cJcyEYqm:k6wksXUZwPicBex7cJwYq
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 9e17cb15dd75bbbd_smart-mp3-converter[1].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\smart-mp3-converter[1].htm
Size 162.0B
Processes 832 (iexplore.exe)
Type HTML document, ASCII text, with CRLF line terminators
MD5 4f8e702cc244ec5d4de32740c0ecbd97
SHA1 3adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA256 9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
CRC32 00F1136A
ssdeep 3:qVoB3tUROGclXqyvXboAcMBXqWSZUXqXlIVLLP61IwcWWGu:q43tISl6kXiMIWSU6XlI5LP8IpfGu
Yara None matched
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name ed50478820b61b88_basswma.dll
Submit file
Filepath c:\program files (x86)\free wma to mp3 converter\basswma.dll
Size 16.1KB
Processes 2032 (FreeWMAToMP3Converter.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 56ed969e1304cbd68659585eaba5b3c7
SHA1 318176dc0d10c10006a036ca7faad9dacbc2c7e7
SHA256 ed50478820b61b88969536153e8268c50ac7a8bae45f67435d8b50cfa03f5624
CRC32 07FC9226
ssdeep 384:oPXjlVeQfdoGEyFH+EmdhLjZ8BED3X5Wdlc:kjLZf5zH+DjZN5Wdlc
Yara
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis