Dropped Files | ZeroBOX
Name 6ec867dc1caa77ec_tmp6442.tmp.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp6442.tmp.dat
Size 18.0KB
Type SQLite 3.x database, last written using SQLite version 3021000
MD5 f3a100cba30b2a07a7af8886e439024e
SHA1 a454cca0db028b4d0fb29fa932c9056519efe2cf
SHA256 6ec867dc1caa77ecfd8e457d464b6bebc3be8694b4c88734fa83d197c0b214cc
CRC32 72CF6AF8
ssdeep 24:LLI10KL7G0TMJHUyyJtmCm0XKY6lOKQAE9V8MffD4fOzeCmly6Uwc6KaW:oz+JH3yJUheCVE9V8MX0PFlNU1faW
Yara None matched
VirusTotal Search for analysis
Name 38c389720b75365f_tmp6421.tmp.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp6421.tmp.dat
Size 72.0KB
Type SQLite 3.x database, last written using SQLite version 3021000
MD5 c480140ee3c5758b968b69749145128d
SHA1 035a0656bc0d1d376dfc92f75fa664bdf71b3e4d
SHA256 38c389720b75365fcb080b40f7fdc5dc4587f4c264ec4e12a22030d15709e4a9
CRC32 954A724F
ssdeep 96:f0CWo3dOEctAYyY9MsH738Hsa/NTIdE8uKIaPdUDFBlrrVY/qBOnx4yWTJereWbY:fXtd69TYndTJMb3j0
Yara None matched
VirusTotal Search for analysis
Name 2c0cadfbc14c61c3_process.txt
Submit file
Filepath C:\Users\test22\AppData\Local\DevilLogger\Process.txt
Size 597.0B
Processes 2212 (updater.exe)
Type ASCII text
MD5 6ccf91e5b9a074661bbabd1751c5c296
SHA1 70dd7e9fd2134dcb738f1767258556b410ce32de
SHA256 2c0cadfbc14c61c3aeec8ffdb06d161b64b28ddb2b8361a83e7be2240fce8aaa
CRC32 EB4F2506
ssdeep 12:ULq0JaqqNrCZsuOYERqqIrCqIz+nT30HJqqzbIQzqqLlEqvbzspGzbIq2hOr3R:4q0JaqqNuWuOYMqqIuqIz+nT30HJqqHd
Yara None matched
VirusTotal Search for analysis
Name 3b046d30dc2e6021_tmp6443.tmp.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp6443.tmp.dat
Size 36.0KB
Type SQLite 3.x database, last written using SQLite version 3021000
MD5 e185515780e9dcb21c3262899c206308
SHA1 230714474693919d93949ab5a291f7ec02fd286f
SHA256 3b046d30dc2e6021be55d1bd47c2a92970856526c021df5de6e4ea3c4144659b
CRC32 25EF2A64
ssdeep 24:TLNg/5UcJOyTGVZTPaFpEvg3obNmCFk6Uwcc85fBvlllYu:TC/ecVTgPOpEveoJZFrU1cQBvlllY
Yara None matched
VirusTotal Search for analysis
Name 4685226342ad5821_screen.png
Submit file
Filepath C:\Users\test22\AppData\Local\DevilLogger\Screen.png
Size 48.0KB
Processes 2212 (updater.exe)
Type PNG image data, 1024 x 768, 8-bit/color RGBA, non-interlaced
MD5 49ed56b3f7a721f9bbd2fa04a04ff96d
SHA1 e4075d8f4e9bb9d55f2b0f6e8196add5a03253ec
SHA256 4685226342ad58218169de629aa4fe2c25d2d13d967c563c6ffe28563105bd34
CRC32 BF0C177F
ssdeep 768:uWfa5Q5Hzkz/isyhIeAuocE6IbUGyjj0ptv5tVYPJHfLTSLJcaVFOZk5Ggh00:uWfaqpzkus6IeHjE6IITv0pF5LcaqZyv
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 72f9aefd0eee0c73_information.txt
Submit file
Filepath C:\Users\test22\AppData\Local\DevilLogger\Information.txt
Size 720.0B
Processes 2212 (updater.exe)
Type UTF-8 Unicode text
MD5 4868ef82cf162b25c0f4422af10ef25f
SHA1 741ac6d52fde6f72137e426eb558dc86d508dd0b
SHA256 72f9aefd0eee0c732c02b5f4a2e16be952286e47637d8c711edeacd1f347e228
CRC32 422FB8CA
ssdeep 12:pYzqLrtQZDOLM3DioFQY2teog/PD7VLb6t:psCxQZ9OGP2teo6L7VLbk
Yara None matched
VirusTotal Search for analysis