Dropped Files | ZeroBOX
Name 2cac401bffa9fd4d_devtools_resources.pak
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\devtools_resources.pak
Size 2.1MB
Processes 2772 (setup.exe)
Type data
MD5 54d4e14bff05c268248cab2eedfb61dd
SHA1 33af472176f6e5fb821ffe23c9fbccc7c735b5b9
SHA256 2cac401bffa9fd4dffe11e05ee18fc5ca7a30ec5bf7ef6a3ea8518a4f3344790
CRC32 5591A7A6
ssdeep 49152:qHlbrhXKMVp/DVegxF2Xe1WFG4F3KMWB7rwz3yY+23:qFnhXKwggr0cWEgaMi7rwrw23
Yara
  • ftp_command - ftp command
VirusTotal Search for analysis
Name ba92995d1296b989_invalidcert[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\invalidcert[1]
Size 4.9KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 57868b56f2ae430d15693e82a827ddb5
SHA1 c72b54f285f93e0ada5d1991dd2e8d1a14aa6a0c
SHA256 ba92995d1296b989dc78b21e8c7eaadc799e91db819f3f83bfba817b28df6e4b
CRC32 6CA10D5C
ssdeep 96:UqUHCkAs5PFkiGjUpG9gHdk0iSAu5hfeGNBz1t9hS:9ULAsnkdjo2gnNBz39hS
Yara None matched
VirusTotal Search for analysis
Name f1f01b3474b92d6e_newtonsoft.json.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\Newtonsoft.Json.dll
Size 560.9KB
Processes 2772 (setup.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 8f81c9520104b730c25d90a9dd511148
SHA1 7cf46cb81c3b51965c1f78762840eb5797594778
SHA256 f1f01b3474b92d6e1c3d6adfae74ee0ea0eba6e9935565fe2317686d80a2e886
CRC32 4C14E598
ssdeep 12288:ZzfhypmNGgHA37YyUD1AboTf3xnpJbC8VGSBJjRuz7:ZoI1AbQf3xnpJbC8VLBJjRuz7
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 6d8a01dc7647bc21_favicon[3].png
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\favicon[3].png
Size 237.0B
Type PNG image data, 16 x 16, 4-bit colormap, non-interlaced
MD5 9fb559a691078558e77d6848202f6541
SHA1 ea13848d33c2c7f4f4baa39348aeb1dbfad3df31
SHA256 6d8a01dc7647bc218d003b58fe04049e24a9359900b7e0cebae76edf85b8b914
CRC32 FC87942A
ssdeep 6:6v/lhPIF6R/C+u1fXNg1XQ3yslRtNO+cKvAElRApGCp:6v/7b/C1fm1ZslRTvAElR47
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name e6bfdfbb9a0649ea_views[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\views[1]
Size 3.3KB
Type HTML document, ASCII text, with CRLF line terminators
MD5 a726593a8261930e4786375106fc6bfe
SHA1 13916b1e1825549e9c36c64e35baca204a83ef95
SHA256 e6bfdfbb9a0649ea9d38de4255c355c581097e6a1035a54943260b22ad45f172
CRC32 73505439
ssdeep 48:4pPowKI58aHF/Au4Azk2qKz7+DomFh9I5G6XNl1wv6s6v7T2M4dl4qbR/s1:pkmaHF/ESzCn2vE6seCP4aR/s1
Yara None matched
VirusTotal Search for analysis
Name 21d03f19c4b1c12d_red_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\red_shield[1]
Size 3.4KB
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 87de5d9a3403e1d7635885cbaa52389d
SHA1 50b32c5966331e3e27bef987fd1da0129423d348
SHA256 21d03f19c4b1c12db2feb8fb3a373d7e378976ecdfb64efb300204edc8947d3d
CRC32 15814E36
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTzVcxkZFd/:5SDS0tKg9E05TJcxi
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 9a2ac1e2cd9ee08f_rd[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\rd[1]
Size 756.0B
Type ASCII text, with very long lines, with no line terminators
MD5 6a116d416d4368c2c174af1df17fbd8c
SHA1 1edd0f9a9e97b4af9f9a59b70ec59e47923f6933
SHA256 9a2ac1e2cd9ee08f0939d51ee6857afd412ea4986be450a7452047ac8df3822e
CRC32 1E26AB03
ssdeep 12:g3/w8KsZ+lmkGhrmrJoj552mzQs0KE5xzmCZE2KwY52m2AWsK8bJ5u:Y48+mhOojL2mzatmCKL2m2mbK
Yara None matched
VirusTotal Search for analysis
Name 91e6d2a44b8be983_getLoginStatus[2].nhn
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\getLoginStatus[2].nhn
Size 138.0B
Type ASCII text, with no line terminators
MD5 adc5d96f6bcef323a83ee760624ded7b
SHA1 04f3cbeb085d8314515123ff7bd103dccbbde616
SHA256 91e6d2a44b8be983adc19513b407a4cf90f87ce0b631750e6d64854f042c3196
CRC32 3801C5C9
ssdeep 3:s8G3fLHrJLVCfLHLtIih9JE29rLjExPDeJV9gEofVtKI:s8G3BhCrhZVQeJV+DVp
Yara None matched
VirusTotal Search for analysis
Name d0ba19f5e334e60f_invalidcert[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\invalidcert[1]
Size 2.1KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 66f441cef8801549c2f0ff12cbe752a5
SHA1 de506bfb63225b3cc084ae292d4bf98a21ae6250
SHA256 d0ba19f5e334e60fb5056bc2e05b97de09aee4db49e5e11abde482bab9c4e8fb
CRC32 13C10CC2
ssdeep 48:mPntofz4/i5DjktylVDJlObUBsBXcysTqysg2Bp5Bi8OwaBynLysTqys4Bwy/Ae:SE4a5HlVDJMbUB2XcylyNkpfi8OwgynN
Yara None matched
VirusTotal Search for analysis
Name fbc23311fb5eb53c_background_gradient_red[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\background_gradient_red[1]
Size 868.0B
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x800, frames 3
MD5 337038e78cf3c521402fc7352bdd5ea6
SHA1 017eaf48983c31ae36b5de5de4db36bf953b3136
SHA256 fbc23311fb5eb53c73a7ca6bfc93e8fa3530b07100a128b4905f8fb7cb145b61
CRC32 C08DA614
ssdeep 24:vk9YMW80o0XxDuLHeOWXG4OZ7DAJuLHenX36n8R0O3kwd2q:M9YM3uERAq8uyJdB
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name cd9be67aa0527f16_cef_200_percent.pak
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\cef_200_percent.pak
Size 283.2KB
Processes 2772 (setup.exe)
Type data
MD5 bf59a047984eafc79e40b0011ed4116d
SHA1 df747125f31f3ff7e3dfe5849f701c3483b32c5e
SHA256 cd9be67aa0527f16e309189fa2369e1a2596d0601a7d55c405f8a619f4d095e9
CRC32 1314492C
ssdeep 6144:tS+8U5mtp0ra7rFriDQYaF+9bQHgs4jTlmOHCZVWGMRe8InVXYopym74:CU5OGUFrfs4gs4jTQ6ebVIo374
Yara None matched
VirusTotal Search for analysis
Name 39e7de847c9f731e_down[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\down[2]
Size 748.0B
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 c4f558c4c8b56858f15c09037cd6625a
SHA1 ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA256 39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
CRC32 B475DDD7
ssdeep 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 9e9ad6885c1113e7_pinball.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\Pinball.exe
Size 182.5KB
Processes 2772 (setup.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 c284d6aab47485796101d7731e291d8c
SHA1 9084cee2bd21fa432e2f37554864de7c08673880
SHA256 9e9ad6885c1113e7286a1d767eae31739e5c1f5a80ecd4f45436c6d0f9c231dc
CRC32 92E38ED4
ssdeep 3072:lTp0Iw+ppOVGHaqwlnhblNK12qtpVNpcaqP/z:dpbPEG6qIbutIB
Yara
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis
Name 5d1a2416d87b70a3_libegl.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\libEGL.dll
Size 370.0KB
Processes 2772 (setup.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 bd80ed8889ee81a7fc0e25ab1445dc4f
SHA1 c9da2ff08feb57fc0de75bd53fc19ceaabd47bb1
SHA256 5d1a2416d87b70a382ea873eab8703d15a17ca5b9ae21221a88e80ab250a84df
CRC32 414973CF
ssdeep 6144:M8NYOU/Tn/83drLYslJysOJH605/Kzb+YuZjKq8W:MkQU+slJyXn1kb+Yh
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 7746b7cfdedfca55_id[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\id[1]
Size 155.0B
Type ASCII text
MD5 893a4f29fbc4c552b74271384628b3db
SHA1 368d05e49f07b691b0a969dfb977459fc49eb1b3
SHA256 7746b7cfdedfca557b8a2e77debcbd23dd3cf8da20da829ff827009406f4a6f7
CRC32 D8A84D07
ssdeep 3:CEPJESa/uDESa/jHIWr8XmbIjpAIggRxkhUs/m/5kcBw:CCJZaUZa0k8WbuiIJihUsmRkcy
Yara None matched
VirusTotal Search for analysis
Name fcc6715e9b73cb3c_f[2].txt
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\f[2].txt
Size 108.0B
Type ASCII text, with no line terminators
MD5 903c1253fbdaee06e78ae86ccf8a2d6a
SHA1 eaf174bdb30d48f358d71c3e9f510bbcf096d14e
SHA256 fcc6715e9b73cb3c1c1b8042fb590efc76697e6187fcada5c5315180252f98d8
CRC32 6FA00502
ssdeep 3:oVewGL34zzxHJzdeJjC0MIdZ+HvpHlxfYf:ogwcozzAjeqZ+nxwf
Yara None matched
VirusTotal Search for analysis
Name 4f32d2d0ac6f3891_chrome_elf.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\chrome_elf.dll
Size 1.1MB
Processes 2772 (setup.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 9b84a2f3adcc28dec9a20a35cd6fc79b
SHA1 e703d1cb3a5e97faa3cafaacded772d46485b1fa
SHA256 4f32d2d0ac6f38912480925de4950e18aaf5ff95c48895ae5c39b0e0e2731c41
CRC32 675742D2
ssdeep 24576:jqgLhuKxE4V5g57ZEw7+J2ZhrJpjZ+91:98KX5g9ZEw7QeFBI1
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name bd9df047d51943ac_192_168_3_119[1].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\192_168_3_119[1].htm
Size 178.0B
Type HTML document, ASCII text, with CRLF line terminators
MD5 cd2e0e43980a00fb6a2742d3afd803b8
SHA1 81ffbd1712afe8cdf138b570c0fc9934742c33c1
SHA256 bd9df047d51943acc4bc6cf55d88edb5b6785a53337ee2a0f74dd521aedde87d
CRC32 0296DA05
ssdeep 3:qVoB3tUROGclXqyvXboAc9FKEIHiHby4AqWSZUXqXlIVLLP61IwcWWGu:q43tISl6kXiWHiHuwWSU6XlI5LP8IpfB
Yara None matched
VirusTotal Search for analysis
Name e6ae96861d043ece_snetchball.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\Snetchball.exe
Size 183.0KB
Processes 2772 (setup.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 90452a0bc3e4933363690479c60cbd6c
SHA1 3f6e1472621d4c9bdfbeab444c7dd8b842703cb0
SHA256 e6ae96861d043ece8f5f08d403f198e488222d098623e7710f797cae4d47626c
CRC32 1DEE1435
ssdeep 3072:STp04MzrdDgyE0CxwaLmlnhbldKCi/fRUV+MHGvP/q:upK3dDgpBL2bixcq
Yara
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis
Name f254a8d5f35978d2_keys_js5[3].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\keys_js5[3].htm
Size 1.0KB
Type ASCII text
MD5 3817e012d3a11ee70fb3ba022b3f05b4
SHA1 7f8219fc154509080ec459134893c56268881629
SHA256 f254a8d5f35978d26c65f54641c9a0fbedf230f57713a9bdd7f1c062f7fe54ab
CRC32 28C2B345
ssdeep 24:avgE2xVRy3x/dxKXjbXDaEKzkOJ7F0zVTefXor+wMwenZfur+wfC:aSeBdxK/XDa9zPJ7F2ZefYrEZfurq
Yara None matched
VirusTotal Search for analysis
Name 68cec96a771fdebd_keys_js5[1].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\keys_js5[1].htm
Size 1.0KB
Type ASCII text
MD5 79636a24650f52629d63a2fce7006d3e
SHA1 4a95c44fa3471f3282025ef7e6914ace123d69d6
SHA256 68cec96a771fdebd225067a72f13515f5103a558c72ccc5980b844ba474d9a3f
CRC32 4E81438E
ssdeep 24:0mGpRmgoJX6RPDaebXDaEKzkOJ7F0zVTefXor+wMwenZfur+wfC:g0goJX6R+YXDa9zPJ7F2ZefYrEZfurq
Yara None matched
VirusTotal Search for analysis
Name 10fe1d7788d9a779_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\dnserror[1]
Size 5.8KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 67bbf4af23868b17115e91fc0f35b5d9
SHA1 f43e2691fa1d733fdfc6dc7c280a659af3bc8dc2
SHA256 10fe1d7788d9a779bcaaeb53f879c6254425e4b64a84b24bbbc099cd7be99058
CRC32 099D8EAD
ssdeep 48:uqUPsV4VWBXvXS4nZ1a5TI7HW/Tu21kpd87KZA9f+upbthDb6Xuzut7Cih0:uOpiEQKHT272axfnRzkh0
Yara None matched
VirusTotal Search for analysis
Name d944ff222626d50e_keys_js5[2].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\keys_js5[2].htm
Size 1.0KB
Type ASCII text
MD5 4883b75693300002c961b6da525a0ffb
SHA1 3e2e7b81671f7d8e233b3c8c2dc0b2965936a8c3
SHA256 d944ff222626d50eab3d10fcfb1e82bf9b768986b6655318236704b327df1aa8
CRC32 D4B7FCCD
ssdeep 24:mwmOEtw0SrX154VWhAOw/1JbXDaEKzkOJ7F0zVTefXor+wMwenZfur+wfC:m76/D1/Z01XDa9zPJ7F2ZefYrEZfurq
Yara None matched
VirusTotal Search for analysis
Name 8448c2ba10a3d7dc_cef_extensions.pak
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\cef_extensions.pak
Size 1.2MB
Processes 2772 (setup.exe)
Type data
MD5 20dda02af522924e45223d7262d0e1ed
SHA1 378e88033a7083aac24e6cd2144f7bc706f00837
SHA256 8448c2ba10a3d7dc8ca3fb24f580bf99d91f746107b1a06e74932749cc1cab01
CRC32 6BE6B4F9
ssdeep 24576:8AkckSbnVLjWG13xdT0b+SLzRYt2k+lbG9EjJNH/osm22O+EcRfPLP:88zVXWG1hdAKSxY4k5EFNHgvPPLP
Yara None matched
VirusTotal Search for analysis
Name 2e7cbb274b70aa6f_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favcenter[1]
Size 687.0B
Type PNG image data, 16 x 16, 8-bit colormap, non-interlaced
MD5 79afa8ab0ff40639c6fb752e88e60ee1
SHA1 c940d08bfeb8a7012f9340c9c4821c8f59b7d38f
SHA256 2e7cbb274b70aa6f564088cb1b58029907b836e73119da8398687ae766b124c7
CRC32 55DFB61F
ssdeep 12:6v/7tWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW2cd//8NOR4JOzPi+oNoF2mcHhC2V:DWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWo
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name d0933292c751f162_ipsec[3].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\ipsec[3].htm
Size 18.0B
Type ASCII text
MD5 789a24f4dd4876faa12bfaf925570e74
SHA1 d7e9c86b8b59a52bbf5350aa7796d7d56af8e3b5
SHA256 d0933292c751f1624771bfdc13416bd7be352099b5698d7e09ade6d22270bc46
CRC32 35ED197A
ssdeep 3:9uuMxevn:9uxYv
Yara None matched
VirusTotal Search for analysis
Name 6d13032b90c9a158_chrome_100_percent.pak
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\chrome_100_percent.pak
Size 590.2KB
Processes 2772 (setup.exe)
Type data
MD5 9f2930a09d58b534a90aa921a1a44c43
SHA1 7859a293a17a08449c9d7b0978407ef02b4a9642
SHA256 6d13032b90c9a158932e253a9473fe09f3ab91455701af5bfcf5b7de81943892
CRC32 8E4A231A
ssdeep 12288:+N8I3HHGgsz5B0GDJQrnKs8SNP+QSsTilHjzU+xRFy8atoO0Tehfn:83n0zEEmPLTcjzLxREtoO0TOP
Yara None matched
VirusTotal Search for analysis
Name e49afdc4cc23e0fe_keys_js5[1].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\keys_js5[1].htm
Size 1.0KB
Type ASCII text
MD5 90a93490455ef62f1e14723de78a45fd
SHA1 5b4b3b791d7421be1d53004712ed1ee498e546e5
SHA256 e49afdc4cc23e0fed6014cb2141087390a3c85927e68fbbe9a08c994064a881f
CRC32 87C7C41F
ssdeep 24:Ap8sL1a36zE54UpbXDaEKzkOJ7F0zVTefXor+wMwenZfur+wfC:oL12x4IXDa9zPJ7F2ZefYrEZfurq
Yara None matched
VirusTotal Search for analysis
Name 6c3c1986f231973a_noConnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\noConnect[1]
Size 5.3KB
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 7686f6957ab9b36be2ebba88772a1541
SHA1 27089f8c09e41fdc4c994f8a5a5b115058479def
SHA256 6c3c1986f231973a68ddbacfd2a40408c8766bb18851c1a80e121f08f9bcf4de
CRC32 CA869C92
ssdeep 96:x4xOKDm0AK8naEFgkQgWmwep7eyaHNdj1BQp3VaYuV5pLeOMnCi:x4xOuuK8nNFgyW3eJe9HzjfQpI5p7md
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 4830c7e99cea01dc_setup.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\setup.exe
Size 94.6MB
Processes 1492 (game_1.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 49e83e3de794bd21d723c2debb211026
SHA1 028152384a06b9661417ea316ef91227c8a42332
SHA256 4830c7e99cea01dc3df1fb59d49d8b5be5a67c069807b73536d0a8de00271c60
CRC32 415E1D82
ssdeep 1572864:s/JZCKZx+ZGy4F9gaf7pby8D1tDIn3VNZzWrn3Q6S4vaWNLN2dJ:s/LVZvaA7pWQ1KnFNVIXSmDNLNg
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • ftp_command - ftp command
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 3b3e541682e48f3f_ionic.zip.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\Ionic.Zip.dll
Size 451.5KB
Processes 2772 (setup.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 6ded8fcbf5f1d9e422b327ca51625e24
SHA1 8a1140cebc39f6994eef7e8de4627fb7b72a2dd9
SHA256 3b3e541682e48f3fd2872f85a06278da2f3e7877ee956da89b90d732a1eaa0bd
CRC32 A55B8181
ssdeep 6144:leSYvQAd10GtSV41OJDsTDDVUMle6ZjxLV/rHo0Oaaz2R9IY:oJBdBS4msNUCe65frHMnz2R9
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name bd16973079baabc5_libglesv2.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\libGLESv2.dll
Size 6.3MB
Processes 2772 (setup.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 603d03f8227e5b62090d03b6917395b9
SHA1 353283c611cca4b11c357b287f1c793840afd943
SHA256 bd16973079baabc56fdde0a1ef96616d22db67f92a0728f081b9fdc52b850002
CRC32 14E8063B
ssdeep 98304:FRnpKarD9grwrFT5kW902DSbRLQbXP6akMCfOYMAvv0XwVK6FbqppfwsasdSh3:Crw55kWe2DSlcbXP6fOYMAvxy
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name e3b0c44298fc1c14_nsbC2ED.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nsbC2ED.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 8d996d5f68bf2248_del.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\Del.exe
Size 8.0KB
Processes 2772 (setup.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 97d4d47d539cb8171be2aefd64c6ebb1
SHA1 44abf82dd553cce0c1f41b9b78d853075ddd1f16
SHA256 8d996d5f68bf2248f223c4f3549303bc6a8ec58cc97fcb63b7bb7d8068850273
CRC32 4D0AA158
ssdeep 96:QPjzIyfbInD3W0IwrBmEH7UewW4ORIhmY5XO40uK8DDzNt:pQIS0IwrJbU7W4kIX5e4kgF
Yara
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 0c4a9f4b17ff7aec_xilium.cefglue.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\Xilium.CefGlue.dll
Size 838.5KB
Processes 2772 (setup.exe)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 cfd0b12572dddb3c64ce501ef6449bae
SHA1 6b4660b11d627f4ab2b034d43e51b7393239f736
SHA256 0c4a9f4b17ff7aecfc4a928ea3be76774b8e4150f185726c5c085cf33e9989b5
CRC32 9DD8E402
ssdeep 24576:oZ4/vpEdaGGMT+hOQIx25IeYI71wHxRZ:oOgaG
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 5520208a33e6409c_inetc.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nsrC2FF.tmp\INetC.dll
Size 21.5KB
Processes 1492 (game_1.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 92ec4dd8c0ddd8c4305ae1684ab65fb0
SHA1 d850013d582a62e502942f0dd282cc0c29c4310e
SHA256 5520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934
CRC32 C495AF3E
ssdeep 384:VpOSdCjDyyvBwRlX+ODbswYM2s74NS0v0Ac9khYLMkIX0+Gzyekx:rdCjW/lX1PfYM2X1
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • ftp_command - ftp command
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 579a034ff5ab9b73_nsprocess.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nsrC2FF.tmp\nsProcess.dll
Size 4.5KB
Processes 1492 (game_1.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 faa7f034b38e729a983965c04cc70fc1
SHA1 df8bda55b498976ea47d25d8a77539b049dab55e
SHA256 579a034ff5ab9b732a318b1636c2902840f604e8e664f5b93c07a99253b3c9cf
CRC32 3CD28811
ssdeep 48:iYXzAm8HGJLvwM8GJFd6I7W4JtT2bxNNAa4GsNf+CJ8aYqmtlKdgAtgma1QvtCSJ:lz2mJkpGR6GY74GQ1YqmstgGCtR
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name c2c7ca6505ad1082_d3dcompiler_47.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\d3dcompiler_47.dll
Size 3.9MB
Processes 2772 (setup.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 e1677ec0e21e27405e65e31419980348
SHA1 666de481c46e2c21b8f0decc7e9115fc61d28acd
SHA256 c2c7ca6505ad10826e6b92319ce7aa355392b0cbd092a0fb8d4381c2d31268bf
CRC32 59232B33
ssdeep 98304:q4Xyn7IfxiYMzgom1mEU/AJC/vujMD9rw:809om1hU/Aavu4D9rw
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 786d87e5eaedabee_getLoginStatus[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\getLoginStatus[1].js
Size 270.0B
Type UTF-8 Unicode text, with no line terminators
MD5 4810e261e5d57ad79ab643044d88bb71
SHA1 8b8be4b5eea4fd8292ccad1c8da4968f009d61b4
SHA256 786d87e5eaedabee435590f15226d43bc12244711c43024333eb3c1e0008b41b
CRC32 55B2CEEA
ssdeep 6:s8G3Tg7KQ4hCr2aC/qcZlH+nEOJE1Ys/FkaXeJV+DVN8EWn:xGE7csQycZlHGEXfZXW+NVWn
Yara None matched
VirusTotal Search for analysis
Name f2afc04a24c9d89d_red_shield_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\red_shield_48[1]
Size 6.8KB
Type PNG image data, 40 x 48, 8-bit/color RGBA, non-interlaced
MD5 f413dd8a75b81a154a1fd5e4c4a0a782
SHA1 667f7e3da51ca3417a1feb66d238466423c9487d
SHA256 f2afc04a24c9d89d3c2f0d73f8cd6fb6b65adbe333196c3f99cc7d6868847ceb
CRC32 D96BDACF
ssdeep 192:8SDS0tKg9E05Tz045xhOwZtbiFHsrC3rlTqpHbW:7JXE05d5xhOwtGsSTqpHC
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 74441313bb1fb625_gap[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\gap[1]
Size 44.0B
Type GIF image data, version 89a, 10 x 1
MD5 96c4c871750d7ca05dfa18ce6a85d369
SHA1 afe63ad72576922e708bdc0bd7bffbec84fd42f5
SHA256 74441313bb1fb62500484443c4937e90d4e335351a4fcd12a9ac48448500e33e
CRC32 13E752AB
ssdeep 3:C3WvExltxlrlen:ncFlen
Yara None matched
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient[1]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name c686babc034f53a2_green_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\green_shield[1]
Size 3.4KB
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 254d388ce19d84a54fd44571e049e6a6
SHA1 51ca725642f679978f5880278e5cac5ca4f70fae
SHA256 c686babc034f53a24a1206019e958ba8fc879216fd7b6a4b972f188535341227
CRC32 265B0B9C
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTkN9D6ZB+:5SDS0tKg9E05TkN92ZE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 713ebb2266bd5192_keys_js5[2].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\keys_js5[2].htm
Size 1.0KB
Type ASCII text
MD5 cec902854d271c5e11670a3429cdcc27
SHA1 10d44dd02cf16e22817738d8bbb8ff344c9ca091
SHA256 713ebb2266bd5192d16da43820f6aece13b9a077ec17aa7067e2bdbd81702791
CRC32 3F80C1B4
ssdeep 24:jp3nSVtSBwxwVdENE1bXDaEKzkOJ7F0zVTefXor+wMwenZfur+wfC:jsccwVdmCXDa9zPJ7F2ZefYrEZfurq
Yara None matched
VirusTotal Search for analysis
Name b122038a876caf6f_getProfile[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\getProfile[1].js
Size 187.0B
Type UTF-8 Unicode text, with no line terminators
MD5 87cda6e9aea9f92c986af015aa29d827
SHA1 b89c12959bcf81d609ee1dc6bb0c53d55d962451
SHA256 b122038a876caf6f6a0e8e9d1e812e595a7f4f80d26737dedd443c5630ddf8cd
CRC32 740007B1
ssdeep 3:zQgdcRXSqXEiHVNaYGuvOPStIEZHftV1iYhDqckd0iX+c2PSzTEWHJE15XcAbqiB:zQvzUiHVH2atIi1P9qck6FcEOJE1VcIB
Yara None matched
VirusTotal Search for analysis
Name c861117d1f1dbf02_cef.pak
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\cef.pak
Size 1.9MB
Processes 2772 (setup.exe)
Type data
MD5 96ad47d78a70b33158961585d9154ecc
SHA1 149bf6f6905a76b0cc9e9aca580357bd6c3497a2
SHA256 c861117d1f1dbf02867b46fa87cb8c65c3213d196029ee81a02b617d131236e2
CRC32 C0B582FD
ssdeep 49152:fpXzD2VLpS71ycdao6LreGCL/0jJZWOiBiXkbEia9T:xjyFgZ0Lr2/0jJU5BiIEN
Yara None matched
VirusTotal Search for analysis
Name 9b7af8bac852e210_getProfile[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\getProfile[1].js
Size 187.0B
Type UTF-8 Unicode text, with no line terminators
MD5 88313eb24c7750e926294bef79ca3143
SHA1 aaf453dab3753a8004cfb900c8c3253a32ba46e7
SHA256 9b7af8bac852e2102b449602f62f5116d96db0bba5c73748a47dce9924160b41
CRC32 D4756D2F
ssdeep 3:zQgfdi21iHVNaYGuvOPStIEZHftV1iYhDqckd0iX+c2PSzTEWHJE15XcAbqiB:zQej1iHVH2atIi1P9qck6FcEOJE1VcIB
Yara None matched
VirusTotal Search for analysis
Name 08eb2aea88420333_chrome_200_percent.pak
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\chrome_200_percent.pak
Size 875.1KB
Processes 2772 (setup.exe)
Type data
MD5 61f229990afa02d78402e87b9f3e7949
SHA1 1167dad04cca9bdc8b02afda3cc3701143c1a0c3
SHA256 08eb2aea88420333aea68ac5e08d4390b9187aa51ced71af687145b013a6e34e
CRC32 0A87F81C
ssdeep 24576:n3i0zkmmibkFR8+mZPsvQtZ3w8NbaPr6edhOLoJJ:n3i0YmNbkFRJm9wQzg8GjrOy
Yara None matched
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 526d4d99a16c035f_807805_114[1].json
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\807805_114[1].json
Size 432.0B
Type UTF-8 Unicode text, with very long lines, with no line terminators
MD5 c34a7e7cac58f00f60b04448922a3404
SHA1 21becc410e8fbbd33f521c7f30cbfdb9bfbf127b
SHA256 526d4d99a16c035f300f8a9898df0276a9489d59cdae5b9b72546c5a91477923
CRC32 DC2D6BF6
ssdeep 12:ecJ2cdLAPAdL3dueudrEJvPX06cSrUOSYGtw9:ec/dUPA3ueuN0XVcSrUpYN
Yara None matched
VirusTotal Search for analysis
Name 2c29cce09778d3d4_cef_sandbox.lib
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\cef_sandbox.lib
Size 80.0MB
Processes 2772 (setup.exe)
Type current ar archive
MD5 093dbc85626db777380ea4c9df195287
SHA1 cc2087ba95381c22949f9dfedb70083aefdd230a
SHA256 2c29cce09778d3d46774f626c36f0e396e5a90b66bc296f85ce3ebccb76640fc
CRC32 B57AA40A
ssdeep 196608:YmEqbYTS9PRyt7fWwmXkRiyPXT14Bt4Bo6yhuKqQJP9or6zvvXCtzdcyChjPQuwV:ZbYTqI7fWmiyP2OyhLDf86Pgr
Yara
  • Malicious_Library_Zero - Malicious_Library
  • OS_Memory_Check_Zero - OS Memory Check
  • OS_Name_Check_Zero - OS Name Check Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name ea03bfd7fdda1eac_f[3].txt
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\f[3].txt
Size 113.0B
Type ASCII text, with no line terminators
MD5 446dfcea2ff3436918f2dacba3cdeab9
SHA1 81972855e41941736d23fee567721e53b4bedb40
SHA256 ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
CRC32 50F4F831
ssdeep 3:oVew2dzzxHJzdd/xC0MId/avHvpHlxfYf:ogw2zzn/xeq/Ynxwf
Yara None matched
VirusTotal Search for analysis
Name edcad5b1ce8a304b_views[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\views[1]
Size 1.8KB
Type ASCII text, with CRLF line terminators
MD5 bee1758a485085bb8a121eb74ba7e96f
SHA1 8024492e1126b17f832e36c932d433200180b693
SHA256 edcad5b1ce8a304b70b8c9ea57d4aeab740d979ffa59243b943011cb1ba4d57e
CRC32 3FB291C2
ssdeep 48:1QuIGYwCQ73ZOaFibdMpn1c2CqWMwr8Qp5lAh:SncJO8ZDru9S
Yara None matched
VirusTotal Search for analysis
Name 97b978a19edd4746_icudtl.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\icudtl.dat
Size 10.0MB
Processes 2772 (setup.exe)
Type data
MD5 76bef9b8bb32e1e54fe1054c97b84a10
SHA1 05dfea2a3afeda799ab01bb7fbce628cacd596f4
SHA256 97b978a19edd4746e9a44d9a44bb4bc519e127a203c247837ec0922f573449e3
CRC32 BBBB1B13
ssdeep 196608:p5zwSv9AAyse6liXUxCGZHa93Whlw6ZCXU0:pyKlysTliXUxCGZHa93Whlw6ZCX1
Yara None matched
VirusTotal Search for analysis
Name 0f5cdbe57a86ffc5_keys_js5[2].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\keys_js5[2].htm
Size 1.0KB
Type ASCII text
MD5 806b8779318889351f73daf895ffaab7
SHA1 fa95480dcef1090776066cd33aa165e12edaa43a
SHA256 0f5cdbe57a86ffc5bc5fc0cb7c16ce8e8800650150db1abe35b3cfc7452adf4d
CRC32 465E139D
ssdeep 24:lIA+2TBKuuJWsV3QKfbXDaEKzkOJ7F0zVTefXor+wMwenZfur+wfC:Hvk3BDXDa9zPJ7F2ZefYrEZfurq
Yara None matched
VirusTotal Search for analysis
Name 6f0ed8ab11b3397d_mailCount[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\mailCount[1].js
Size 49.0B
Type ASCII text, with no line terminators
MD5 c11f0b04a91dc2cc641f5f2359bafe42
SHA1 c1a6ff11de2e9e09c710aef8c6a91276e0e806d2
SHA256 6f0ed8ab11b3397d955c42f209bb455beb3b299768c87be2514fa96b5c57ff57
CRC32 C010593D
ssdeep 3:RloKieXgXvv2RwrrUf:vo/n2Rd
Yara None matched
VirusTotal Search for analysis
Name 18ae9d76727c45a5_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\errorPageStrings[1]
Size 2.0KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 867666e4f73a755e0c135ce4e90de230
SHA1 a7b1d23f1d2ef9de6b149925147d44076e17fcb3
SHA256 18ae9d76727c45a577073bfc8d8914fedccfcf43b5afeeaf26737448712334e3
CRC32 D8C63FA6
ssdeep 48:z9UUiqu6xl8W22751dwvRHERyRyntQRXP6KtU5SwVze/6e/+Ng7FU50U5ZF0:z9UUiqRxqH211CvRHERyRyntQRXP6C8o
Yara None matched
VirusTotal Search for analysis
Name e0f5c754c969cca0_cef_100_percent.pak
Submit file
Filepath C:\Users\test22\AppData\Roaming\Pinball\cef_100_percent.pak
Size 209.1KB
Processes 2772 (setup.exe)
Type data
MD5 391f512173ecec14eb5ce31299858de1
SHA1 3a5a41a190c1fb682f9d9c84f500ff50308617fc
SHA256 e0f5c754c969cca0ac4594a6f3f2c23d080a09eea992af29e19f4291fd1e0b06
CRC32 AC617E8D
ssdeep 6144:m5S+8U5mtp0ra7rFrJzw95T9OHCZg0Gb0OveGe04mExhLY:mWU5OGUFoqoORehrQ
Yara None matched
VirusTotal Search for analysis
Name dba15736751a45dc_keys_js5[1].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\keys_js5[1].htm
Size 1.0KB
Type ASCII text
MD5 5a3ab9e38f59b345e5de3aa02d077ae0
SHA1 3723c1a5f7e661e29e2f698f673473ccd7a7c2c1
SHA256 dba15736751a45dcc8811119aebe35e5ab0bf0592617818e6b966dd181a8d635
CRC32 D2326B60
ssdeep 24:y8E8Zx1Hv1bXDaEKzkOJ7F0zVTefXor+wMwenZfur+wfC:/Zx1HBXDa9zPJ7F2ZefYrEZfurq
Yara None matched
VirusTotal Search for analysis
Name 8d018639281b33da_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\ErrorPageTemplate[1]
Size 2.1KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1 f4eda06901edb98633a686b11d02f4925f827bf0
SHA256 8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
CRC32 E6FF242A
ssdeep 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
Yara None matched
VirusTotal Search for analysis