Dropped Files | ZeroBOX
Name 6dc8346cc7d12272_rage131mp.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\rage131MP.tmp
Size 13.0B
Processes 3008 (c2e58d8472.exe)
Type ASCII text, with no line terminators
MD5 07b77b16bdee6a107e8e2db2e0525b65
SHA1 e798fe128002da298318cab116d5e3222bc4b753
SHA256 6dc8346cc7d122726e94d6d7bb291e0bedc78751a5b0aa36a18adf53bc720857
CRC32 7C2C382A
ssdeep 3:LYS0:cS0
Yara None matched
VirusTotal Search for analysis
Name 4b9864bd36faeaf8_debug.log
Submit file
Filepath C:\Program Files (x86)\Google\Chrome\Application\debug.log
Size 290.0B
Processes 2904 (chrome.exe)
Type ASCII text
MD5 8a91dc655a2b1b5bb0b4e662f316c6e2
SHA1 b9bdf59c9e2f0d1b3f4d316f912189439dc01447
SHA256 4b9864bd36faeaf83032df1b3d0369d7bd8ed4bdf315bf74a04b8c05ee70df0b
CRC32 E1FE171D
ssdeep 6:qS448TCGGDLeX/WQeEUgRU4LGGFw3V4v8R6eOsRU4LGGFw3V4vF:OJOOWQSgRU4LG6w3V6A6dsRU4LG6w3VO
Yara None matched
VirusTotal Search for analysis
Name 824fae3331b95e2f_jOLNFtn9XtNiLogin Data
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\jOLNFtn9XtNiLogin Data
Size 40.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 41c19a9e8541fcb934c13c075bf47721
SHA1 648a7622d533d79b9a0bb31dc370134ec3a75ed7
SHA256 824fae3331b95e2f88ca60c87a6c9569086906ec76fc1db8d6dee9adddc4e80c
CRC32 560F7642
ssdeep 48:+35TqYzDGF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:Ulce7mlcwilGc7Ha3f+u
Yara None matched
VirusTotal Search for analysis
Name 91ac6fa92e47d4fa_c2e58d8472.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\1000056001\c2e58d8472.exe
Size 2.2MB
Processes 2264 (explorha.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0af1d8348c83c80e0b3a5efbb125360d
SHA1 f9a19e8f44c01259b2608775e5d73f7e417b9057
SHA256 91ac6fa92e47d4fa85d67da6ee60eef0c3c2b72506e0b814003c78b6b73b6c2c
CRC32 82546991
ssdeep 49152:LeF1xn14//m4bUkreDe4KUuw6hYx85iEdchNNJ/8BugrDU:q1xn1B4bUqVQCYxJO4gugfU
Yara
  • PE_Header_Zero - PE File Signature
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 4993311fc913771a_passwords.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\adobe8XKmc_OCaYb0\passwords.txt
Size 4.8KB
Processes 3008 (c2e58d8472.exe)
Type UTF-8 Unicode text, with CRLF, LF line terminators
MD5 b3e9d0e1b8207aa74cb8812baaf52eae
SHA1 a2dce0fb6b0bbc955a1e72ef3d87cadcc6e3cc6b
SHA256 4993311fc913771acb526bb5ef73682eda69cd31ac14d25502e7bda578ffa37c
CRC32 FDAE46B8
ssdeep 48:4MMMMMMMMMMdMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMMMMdMMMMMMMM3:q
Yara None matched
VirusTotal Search for analysis
Name 8916fb1d76be83e4_IWPfiAXUTJTSformhistory.sqlite
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\IWPfiAXUTJTSformhistory.sqlite
Size 192.0KB
Type SQLite 3.x database, user version 4, last written using SQLite version 3031001
MD5 6b9c2ac2b5025e180231d8d38ece698c
SHA1 36f5cfe6ac59aaa7d7173555edeef5caa9bf61c6
SHA256 8916fb1d76be83e42cd2f7b41ee06706fe0adb936259ed7a7daa4dbcb4c51fcb
CRC32 95ACFD74
ssdeep 12:DBl/lkf12Of5LZWfY0xpMujuHWMu6N2OHjWOzMbdym/eRgBoQFmgW2FOmO6Mz6LX:DLlI1x7WxHaiSlMxosJF/Ezo
Yara None matched
VirusTotal Search for analysis
Name a203d9a13d85a315_explorha.job
Submit file
Filepath C:\Windows\Tasks\explorha.job
Size 274.0B
Processes 1680 (amadka.exe)
Type VAX-order 68k Blit mpx/mux executable
MD5 2dea5dc4cbc45a0de1d2e532b35d4fa7
SHA1 078ee1839cc3b4efb42b2f0a1246707926e2b925
SHA256 a203d9a13d85a3154af891565e2e60a2cdee2b1509a75989602520778449e0d1
CRC32 767DAEA4
ssdeep 6:FtF/VXE/Xm/UEZ+lX1y6y2l+lRdtI4y0lt/At0:XDkW/Q1y6NkDw4V+t0
Yara None matched
VirusTotal Search for analysis
Name 9e6e4772050998a5_readme.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\_Files_\readme.txt
Size 10.0B
Type ASCII text, with no line terminators
MD5 eb6b6c90251ab33cee784713c451e6d8
SHA1 451685e9efac4a6dc1fee73ec53ffb6b2c4c38b5
SHA256 9e6e4772050998a5c0dc3c61acf3dab0a7e594566171fa5746d6b62f9598efb6
CRC32 22598B08
ssdeep 3:IS:7
Yara None matched
VirusTotal Search for analysis
Name 5f622a2bfeb83b59_thunderbird_g8t0pe67.default-release.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\adobe8XKmc_OCaYb0\Cookies\Thunderbird_g8t0pe67.default-release.txt
Size 361.0B
Processes 3008 (c2e58d8472.exe)
Type ASCII text, with CRLF line terminators
MD5 95dff27b67a96f98827e72f9330eb164
SHA1 2d86a3aca1d9a7c16127a333fe642cae08cea0c8
SHA256 5f622a2bfeb83b597d9556ffc8bc107e219eb6ab2ef3cff2d4428e5048ebddad
CRC32 4C9B7FD3
ssdeep 6:JiKjaphXX7aQ2vSI95Bj9GfBHthf+CthfMl0kq/H+LkiKjaphXXrSdrNBPPi1H:J/EhXraQ2v795BxGfBHff+CffMOkqP0J
Yara None matched
VirusTotal Search for analysis
Name 376bc0c7a4e220be_information.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\adobe8XKmc_OCaYb0\information.txt
Size 3.6KB
Processes 3008 (c2e58d8472.exe)
Type UTF-8 Unicode text, with CRLF, LF line terminators
MD5 aedb4a7879b34f831485d4dd126d177a
SHA1 d1d85a9bd33af798dbf3c2a1582f4cecf4e59b77
SHA256 376bc0c7a4e220bed2b8981fa6fbff0d52ca4fc49886c5d221f1428ccde3230d
CRC32 DF5AA0D0
ssdeep 96:xfirAUFL3BmtfNPsmfQBS7yr0iAxv+mLqVnZJVuYU8rf2dIv2Ovhiax3:xaDNxmtfNPVfQB6yro2MS3
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 9814551a7e3cb279_590aee7bdd69b59b.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\590aee7bdd69b59b.customdestinations-ms
Size 7.8KB
Processes 2728 (powershell.exe)
Type data
MD5 e6c5ffd17e011a8ea6fc0926aa68033e
SHA1 04e78c45be03b3e2d4a7a0d0a0796f65fc972fb0
SHA256 9814551a7e3cb279767f96ad7c0e80b14994822fda3c83e35f63f1c747feb4f4
CRC32 273403E9
ssdeep 96:0tuCeGCPDXBqvsqvJCwoRtuCeGCPDXBqvsEHyqvJCworDPtDHXyf2lUVul:0tvXoRtvbHnorxTyQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name f6bbd59838342dd1_fngFH3A7dPtUNr1RutYxA7Q.zip
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\fngFH3A7dPtUNr1RutYxA7Q.zip
Size 2.4KB
Processes 3008 (c2e58d8472.exe)
Type Zip archive data, at least v2.0 to extract
MD5 85e6fcb71fcc840d2a6f76163760d36d
SHA1 1f8dd07cff9db7822539827f10b983b843a82587
SHA256 f6bbd59838342dd10e358afdfbfbe2848a623c8e68eaa5af155ec534c0a35311
CRC32 CEB3B356
ssdeep 48:9naQIn1phVxln6mkqF0r6INLgIFZMbY0Rb9/DwU6l5n3KJ6XkQhn1qc9w:c1pv/Wr6aLZFZV0Rb1K53KJu1O
Yara
  • zip_file_format - ZIP file format
VirusTotal Search for analysis
Name 54cfed4f859d0ec3_pRvscECOk_gwHistory
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\pRvscECOk_gwHistory
Size 116.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 6f490da5428093674c9e609077dcdef2
SHA1 d77592944313656a90f359fea62921c20078ff19
SHA256 54cfed4f859d0ec37535b9f16acfe42cae6206fad4b1652c2a3d33d5acf636c7
CRC32 A046246D
ssdeep 48:T4ItVG+3C7nNfVcS2+VANULn36uw5NPM5ETQTpUPxK2PIs6kJL5R2+zaSZ00LTLU:ce/C7n/c0VANUjwQU+KraSZ00LTL0J
Yara None matched
VirusTotal Search for analysis
Name edb006e05cfa8501_Y34uBdrvpPpRCookies
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\Y34uBdrvpPpRCookies
Size 36.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 3f5ca3e29b1b60e298aeca0a32164c03
SHA1 f9b5ee59c31a3b06a6b8e476b22d2d7cf1fa8b66
SHA256 edb006e05cfa85015aa76c758d6298c279fd318cff0dbb286927c7ad45105488
CRC32 E1ACA097
ssdeep 24:TL2C0RlPbXaFpEO5bNmISHdL6UwcOxvo5:TYLOpEO5J/KdGU1Eo5
Yara None matched
VirusTotal Search for analysis
Name 0e3dc4ccd259716b_settings.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
Size 40.0B
Processes 2816 (chrome.exe)
Type data
MD5 62325aa04f35880232330f344df8018c
SHA1 58fe9532ee8d96e8d12448408cf3ccf9d0542543
SHA256 0e3dc4ccd259716b24376fddb4ee07a6c227f8bcb2532a7dd75bb36a4290e7cc
CRC32 6F0BEA7C
ssdeep 3:FkXJRYcTUM:+wcTb
Yara None matched
VirusTotal Search for analysis
Name b3dfa692f7da19ee_D87fZN3R3jFeplaces.sqlite
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\D87fZN3R3jFeplaces.sqlite
Size 5.0MB
Type SQLite 3.x database, user version 69, last written using SQLite version 3038003
MD5 c395620f9a8337341636a78a98f5b3d9
SHA1 97700ec4db7362e02a56df5e70dd828ad9823d24
SHA256 b3dfa692f7da19eede9aa2fe2ac76052cfaa32a7d30cc53b88ea5ef23ec32624
CRC32 476CDB88
ssdeep 192:StsqHQnwkYjcoBMc+uySBQies13A29D+oBpp0:StsbwVTBMc+uySOiJ3Z
Yara None matched
VirusTotal Search for analysis
Name 12fef2d5995d671e_clip64.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\a091ec0a6e2227\clip64.dll
Size 109.5KB
Processes 2264 (explorha.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 726cd06231883a159ec1ce28dd538699
SHA1 404897e6a133d255ad5a9c26ac6414d7134285a2
SHA256 12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
CRC32 B0574FB3
ssdeep 3072:Q3uSD+ZwruS0bGcuZRt2sSZV/Q3IegRQod4l:AuTiabHuZRAFtlD4l
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • Win_Amadey_Zero - Amadey bot
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name c119a54b6bef3a48_WNJsZjjR_FXoWeb Data
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\WNJsZjjR_FXoWeb Data
Size 80.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 255929949dea51a2f43a1f40e63764ec
SHA1 8f32ab419264fdad05f4f3828db3c1cd38d919fd
SHA256 c119a54b6bef3a48234950dc07fe70f73b69d1390ef0235e66481faa1048ead6
CRC32 F7A79605
ssdeep 96:5Bc7fYLKYZCIdE8XwUWaPdUDg738Hsa/NhuK0l0q8oc5PyWTJereWb3lxzasq9u4:5BPOUNlCTJMb3rEDFAa6E/
Yara None matched
VirusTotal Search for analysis
Name 64f71ed881fd1d38_ce7dc404a0.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\1000055001\ce7dc404a0.exe
Size 1.1MB
Processes 2264 (explorha.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f8858a32305a9cf602f3b3057ad3c9d0
SHA1 2699b2798cf9c49d7668024a75dc4b769f6d2537
SHA256 64f71ed881fd1d38c04c1c7ac57cd2fabd577fde1e0b6ac00c73523f853f5cd2
CRC32 CE3CAE43
ssdeep 24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8aue2+b+HdiJUX:TTvC/MTQYxsWR7aue2+b+HoJU
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 0cb6c83b0279d429_ffdd21e2-54bb-42d6-a242-227356a04cde.dmp
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\ffdd21e2-54bb-42d6-a242-227356a04cde.dmp
Size 548.5KB
Processes 2904 (chrome.exe)
Type Mini DuMP crash report, 10 streams, Fri Apr 19 13:51:10 2024, 0x0 type
MD5 fd4daf362ea836fc1d6c2d1565e20c18
SHA1 aaaa608a328f3587714c49e860ca78d639e6993d
SHA256 0cb6c83b0279d42900c48816880ab189b28e4b68c5c50f4a6ec96eb4c6fb621c
CRC32 5D9B5AE3
ssdeep 3072:xPab64UaDDjqG7NrTcBK06OQ6R3CcnO1CiqAh:ZJ47/S3VkCq
Yara
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 0c3cc9957e59f0e1_metadata
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata
Size 114.0B
Processes 2904 (chrome.exe)
Type data
MD5 b77250f50061e0c3a27dcd8bf3072173
SHA1 ae9b676ed2d884a3a7fc5b7c4fe02d47f998f1a8
SHA256 0c3cc9957e59f0e1a12a517948ce97dd0ff2b7f2680e58b60b16d2332b9f3d55
CRC32 837E58AE
ssdeep 3:mTll+Xl02CallnH51nlMyIQRnsXSuXNnd:mTlEMa/nCytR4XNnd
Yara None matched
VirusTotal Search for analysis
Name 6c5e107a101b6c61_amert.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\1000054001\amert.exe
Size 1.9MB
Processes 2264 (explorha.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 65151161f94cee5aa71816b6b7f7486d
SHA1 ad6fd776ce9dad220f994ca362eabe53ee80a8b0
SHA256 6c5e107a101b6c61579cceed14f77732ae4e735e3ee9646b30394851ed7f88fc
CRC32 0FEE93EA
ssdeep 49152:naPG4y+LgWLVdSlXjPXZXSepv7PFvbWINUp:nKy+MKVdSlTPj7PFvRk
Yara
  • PE_Header_Zero - PE File Signature
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 0b8607fdf72f3e65_02zdBXl47cvzcookies.sqlite
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\02zdBXl47cvzcookies.sqlite
Size 96.0KB
Type SQLite 3.x database, user version 12, last written using SQLite version 3038003
MD5 d367ddfda80fdcf578726bc3b0bc3e3c
SHA1 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA256 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
CRC32 842B3569
ssdeep 12:DQAwfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAwff32mNVpP965Ra8KN0MG/lO
Yara None matched
VirusTotal Search for analysis
Name 3c97bb410e49b11a_cred64.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\a091ec0a6e2227\cred64.dll
Size 1.2MB
Processes 2264 (explorha.exe)
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 15a42d3e4579da615a384c717ab2109b
SHA1 22aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA256 3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
CRC32 4FF3BA47
ssdeep 24576:IvkQL6YY4wMPSYZofkf0Gh6Pi41+a9uyP5dggky+yC7:IsMPSYcS5wPi095Pbg9y
Yara
  • IsPE64 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name d88d05f51f03336d_chrosha.job
Submit file
Filepath C:\Windows\Tasks\chrosha.job
Size 272.0B
Processes 2508 (amert.exe)
Type VAX-order 68k Blit mpx/mux executable
MD5 4b7e18221b24c05593542acafaa3ee55
SHA1 c97afca26056d58f49fc2565f0ad2f5b46091c79
SHA256 d88d05f51f03336df382b31fce4446768abab624d858545b2a93bd373102d6ac
CRC32 4C877F57
ssdeep 6:0m9OfXE///UEZ+lX1ErCqdtI4y0lt/At0:0zk//Q1Eeqw4V+t0
Yara None matched
VirusTotal Search for analysis
Name 88f9dc0b9a633e43_KvHrxJ77cmUgcookies.sqlite
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\KvHrxJ77cmUgcookies.sqlite
Size 512.0KB
Type SQLite 3.x database, user version 11, last written using SQLite version 3031001
MD5 dd47ebe6866ad2ab59d0caa1de28d09e
SHA1 afdf6eb7a01bb7ef4c9d768b65abbbeae5ba2663
SHA256 88f9dc0b9a633e43c6d2c6fae136e782c15aa38c1601dcff948987f1c2a391c3
CRC32 8DEE9EEA
ssdeep 24:DQHtJl32mNVpP965hKN0MG/lZpNjCKRIaU5BnCMOkC0JCpL3FYay:DQfrbWTTTqtStLm
Yara None matched
VirusTotal Search for analysis
Name 169c04331f72fe4a_QdX9ITDLyCRBplaces.sqlite
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\heidi8XKmc_OCaYb0\QdX9ITDLyCRBplaces.sqlite
Size 5.0MB
Type SQLite 3.x database, user version 53, last written using SQLite version 3031001
MD5 f77930486de1b1bb4b397d5d8f3cd124
SHA1 e3f5727a0774c7cba17f0b10569012dcea24cb55
SHA256 169c04331f72fe4ae9958da09e1b28ec5910f7ea523d6105b7e4ad521b2baaee
CRC32 D85072F9
ssdeep 96:Dm8j5PnH6xY2Wi+67tH2iB4q2xfX7ZbiZzdFzb4PPwI3A7:l5/IYOTAlQzdFzaDm
Yara None matched
VirusTotal Search for analysis
Name 8c8afd00e6087780_explorha.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\09fd851a4f\explorha.exe
Size 2.8MB
Processes 1680 (amadka.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f854143c49c4d2fa4cf73bab97ba8d3a
SHA1 62454e89cf9b2558347e2179f49fb4a56f4762ec
SHA256 8c8afd00e6087780e4ee0a36f170ba06f13ba6d0c46cd2119b876e88d40c24e3
CRC32 17ECD98F
ssdeep 49152:hz28Myn3uFDrmGjA1n1Nrd/O9LunYp6VyiW9k2MYD:p28pn3yD6F7rd/OrYyiT2M
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis