Dropped Files | ZeroBOX
Name aad1c9be17f64d77_background.js
Submit file
Filepath C:\Users\test22\AppData\Local\22tset\llg\background.js
Size 596.0B
Processes 2200 (RegAsm.exe)
Type ASCII text
MD5 aa0e77ec6b92f58452bb5577b9980e6f
SHA1 237872f2b0c90e8cbe61eaa0e2919d6578cacd3f
SHA256 aad1c9be17f64d7700feb2d38df7dc7446a48bf001ae42095b59b11fd24dfcde
CRC32 E178B0F4
ssdeep 12:8/ACiDfZISRZLWxicmFGW8NkzCIzvWkE5rBQNFBajVDGwgI/:8ICi9IyLWxHyGWMjIzWccMFG
Yara None matched
VirusTotal Search for analysis
Name f07f2253ea7fe6fb_icon.png
Submit file
Filepath C:\Users\test22\AppData\Local\22tset\llg\icon.png
Size 6.3KB
Processes 2200 (RegAsm.exe)
Type PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
MD5 d263f71812c3f4a7ce58df7ac7e8b775
SHA1 8ba2d02b9ac3b2e6704a9e9ef7b7fb00899bc32d
SHA256 f07f2253ea7fe6fbc0a6a59e25dfe6a590bb1848003bbe4100ce1f1410ff628c
CRC32 F91AF896
ssdeep 192:8oMFYK7tVPiqoVTZP36k5LP5fGf9cCEjIO:zKx0qG/6k5FuFcCC/
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 607b79979597a94b_content.js
Submit file
Filepath C:\Users\test22\AppData\Local\22tset\llg\content.js
Size 1.8KB
Processes 2200 (RegAsm.exe)
Type ASCII text
MD5 3a6db1a5b2ed6fc67a9f969b10a8747c
SHA1 1fe4e16a4df7306dfc091395070d44bffc14fdb1
SHA256 607b79979597a94b6982a384f38b326c791ff6f9364632467ca7739b468fa3fc
CRC32 2991B0DF
ssdeep 48:k41iVUYRor51e0Ad7hR/NAGVqkh3vCI4dBoYCY+YCL:k41OU8thjvfC8
Yara None matched
VirusTotal Search for analysis
Name 2aafd1356d876255_manifest.json
Submit file
Filepath C:\Users\test22\AppData\Local\22tset\llg\manifest.json
Size 569.0B
Processes 2200 (RegAsm.exe)
Type UTF-8 Unicode text
MD5 2835dd0a0aef8405d47ab7f73d82eaa5
SHA1 851ea2b4f89fc06f6a4cd458840dd5c660a3b76c
SHA256 2aafd1356d876255a99905fbcafb516de31952e079923b9ddf33560bbe5ed2f3
CRC32 91CD567C
ssdeep 12:flNAuCONn3Ao19aHuDFRJIbpmxbuvWB0vXY:flVCONQo1XabpWuvPvXY
Yara None matched
VirusTotal Search for analysis
Name 24262baafef17092_jquery.js
Submit file
Filepath C:\Users\test22\AppData\Local\22tset\llg\jquery.js
Size 93.5KB
Processes 2200 (RegAsm.exe)
Type ASCII text, with very long lines
MD5 3c9137d88a00b1ae0b41ff6a70571615
SHA1 1797d73e9da4287351f6fbec1b183c19be217c2a
SHA256 24262baafef17092927c3dafe764aaa52a2a371b83ed2249cca7e414df99fac1
CRC32 25F43FB9
ssdeep 1536:/PEkjP+iADIOr/NEe876nmBu3HvF38sEeLHFoqqhJ7SerN5wVI+xcBmPv7E+nzmQ:ENMyqhJvN32cBC7M6Whca98Hrp
Yara None matched
VirusTotal Search for analysis
Name 59a6b38354e2905e_secure preferences
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
Size 35.3KB
Processes 2200 (RegAsm.exe)
Type UTF-8 Unicode text, with very long lines, with no line terminators
MD5 3d93298e21688f2bfb43a3b0bfc23fa4
SHA1 1f0efbc9d45849a93f3197d363e7bfa5165e4699
SHA256 59a6b38354e2905e35bae3d310840d6671a58d04cc0ac34282cc983286dd5eb9
CRC32 12998659
ssdeep 768:laJRugQcIL4ALZLlfM1kXqKf/pUZNCgVLH2HfLrUdRHn+/2j/ogl+:iR1abZL4nHnM1
Yara None matched
VirusTotal Search for analysis
Name edb006e05cfa8501_tmpD423.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpD423.tmp
Size 36.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 3f5ca3e29b1b60e298aeca0a32164c03
SHA1 f9b5ee59c31a3b06a6b8e476b22d2d7cf1fa8b66
SHA256 edb006e05cfa85015aa76c758d6298c279fd318cff0dbb286927c7ad45105488
CRC32 E1ACA097
ssdeep 24:TL2C0RlPbXaFpEO5bNmISHdL6UwcOxvo5:TYLOpEO5J/KdGU1Eo5
Yara None matched
VirusTotal Search for analysis