Dropped Files | ZeroBOX
Name 0a41422f74c44dc9_network-workgroup-symbolic.symbolic.png
Submit file
Filepath C:\Users\test22\AppData\Local\Ledighedsprocenterne\Gldsttende\Pallas\network-workgroup-symbolic.symbolic.png
Size 219.0B
Processes 2996 (SO9006759004_NEW_ORDER_P202.EXE)
Type PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
MD5 16c12690fe3af4cc69ec7375428894c0
SHA1 cba1f33bc85f6f667473ddd782d45abba9ed90f2
SHA256 0a41422f74c44dc90f4b3ac022e5c05c7d3a36b7fec9531ff69003c48b594919
CRC32 4F03D7D4
ssdeep 6:6v/lhPysck2khw0PyyCqJ254QBtIzgaZ5jp:6v/78NRjqJ254AtKgoN
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name e3b0c44298fc1c14_nsw273A.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nsw273A.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name a632d74332b3f08f_system.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nsx2B33.tmp\System.dll
Size 11.5KB
Processes 2996 (SO9006759004_NEW_ORDER_P202.EXE)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 75ed96254fbf894e42058062b4b4f0d1
SHA1 996503f1383b49021eb3427bc28d13b5bbd11977
SHA256 a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
CRC32 BFE90AC5
ssdeep 192:X24sihno0bW+l97H4GB7QDs91kMtwtobTr4u+QHbazMNHT7dmNIEr:m8vJl97JeoxtN/r3z7YV
Yara
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name ff18694be15c887d_agglomerative.opa
Submit file
Filepath C:\Users\test22\AppData\Local\Ledighedsprocenterne\Gldsttende\Pallas\agglomerative.opa
Size 163.2KB
Processes 2996 (SO9006759004_NEW_ORDER_P202.EXE)
Type data
MD5 df8c97fc071f27557895a6aa6c422016
SHA1 2de4f33a6db602d52ac37324855e97d2b7b6b349
SHA256 ff18694be15c887d28aacdfa73d58ccc07311c6f4b0942c576ba0d494023384b
CRC32 856B8894
ssdeep 3072:MDkwxATw+zeSZwKt8TImZryPHHa1ZBCoSPQKMaOe4USu2rVSsgj3kQ:MDVATNzeSBgBrCH61yozaOe4Ud4Vajz
Yara None matched
VirusTotal Search for analysis
Name 50afe8576cdf9030_jacksonia.con
Submit file
Filepath C:\Users\test22\AppData\Local\Ledighedsprocenterne\Gldsttende\Pallas\Jacksonia.Con
Size 16.9KB
Processes 2996 (SO9006759004_NEW_ORDER_P202.EXE)
Type ASCII text, with very long lines, with no line terminators
MD5 528b33b7501feb1e3cf3281a1d85f9c2
SHA1 1e9b460aa0dd4716b5b313e4dd2c8a1470beca51
SHA256 50afe8576cdf9030428ebd725f8248e0f870cacdfde7e56678a35fefd66def11
CRC32 431AAA9F
ssdeep 192:Qs2/LQzc6SN2EMxY6ABoXH29EEEAHVlo38nfSe8oUNEmoCooooZr+9dJtYxQlFc5:p2r6SN2D+vsH2hm5e8oUcWr+9DwOFc5n
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)
VirusTotal Search for analysis