Dropped Files | ZeroBOX
Name ac9dfe3b35ea4b89_system.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nscC187.tmp\System.dll
Size 11.5KB
Processes 2052 (hkcmd.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 0063d48afe5a0cdc02833145667b6641
SHA1 e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256 ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
CRC32 B233B75E
ssdeep 192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4
Yara
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 4c875c182679e590_ishpingo.cos
Submit file
Filepath C:\Users\test22\diopsidic\Klverblad\Ishpingo.Cos
Size 259.5KB
Processes 2052 (hkcmd.exe)
Type data
MD5 920c54a1f990052e8c5c57fdb764c436
SHA1 8643efd39d7ccc226d403e18d4d85cae92065f95
SHA256 4c875c182679e5900562b2c76117b3583ff53ce4f17ac981962ace9a61e01d82
CRC32 CB6D4759
ssdeep 6144:OkolqXZj/sL0LDtokPBToM3v051UwDREyTk2qR8eS9m:Ok5/oPk58qv056wREy41
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_nsrC0F9.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nsrC0F9.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 0c951826083e6ae4_view-conceal-symbolic.svg
Submit file
Filepath C:\Users\test22\diopsidic\Klverblad\Handlingsplanerne\Quiritary\view-conceal-symbolic.svg
Size 495.0B
Processes 2052 (hkcmd.exe)
Type SVG Scalable Vector Graphics image
MD5 22649992955e29eb61928e2f766d4680
SHA1 b6f3c15004abdd7f478cd57c680d4a3701b089ee
SHA256 0c951826083e6ae4162fe0d9894dd4b257a6be9ba81305e2b37e75f2d87bb022
CRC32 424363C4
ssdeep 12:t4Cpl+qnbOQQX1P+a1wTTqpZVJ2xdopqxRot2APlKA:t4Cpl+7QqP+CuOQxqi62APlf
Yara None matched
VirusTotal Search for analysis
Name 5ed8d9fc9f71e97d_tools-check-spelling-symbolic.symbolic.png
Submit file
Filepath C:\Users\test22\diopsidic\Klverblad\tools-check-spelling-symbolic.symbolic.png
Size 256.0B
Processes 2052 (hkcmd.exe)
Type PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
MD5 a9f844098f2dbf498ada76f365cc0aff
SHA1 9d87fedef08ef552baee88a4e7e2c41be4331f9a
SHA256 5ed8d9fc9f71e97d6f78344c27ced4ea88e938d61a916f0559928c875dc335b6
CRC32 4B1D5556
ssdeep 6:6v/lhPysKHhSiVltL0qn0jBW5mE7ZaIWrFvxyXip:6v/7qHhSkj517kjyXo
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis