Dropped Files | ZeroBOX
Name ab86f801b5ed71c5_selection-start-symbolic.symbolic.png
Submit file
Filepath C:\Users\test22\Murraro\Ulykkestilfldets\selection-start-symbolic.symbolic.png
Size 142.0B
Processes 1072 (lsass.exe)
Type PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
MD5 b361cad290962835529009e96e49cc9f
SHA1 2e29cb53b9b3bd6a433fb2c50950288e321ae551
SHA256 ab86f801b5ed71c581e2a68b6e052953c6b5b95dfbc617a117dea9b084429618
CRC32 EE9C4674
ssdeep 3:yionv//thPl9vt3lAnsrtxBllBM9JT8J6yjjJmS/PB3eD0bdR1rrF/1p:6v/lhPysz8JYJvf/lc0bTxzp
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 6fcea34c8666b063_system.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nsbC0AC.tmp\System.dll
Size 11.5KB
Processes 1072 (lsass.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
CRC32 7D939E74
ssdeep 192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
Yara
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 61b2200490495b88_system-help-symbolic.svg
Submit file
Filepath C:\Users\test22\Murraro\Fles\Underfaktureringen\system-help-symbolic.svg
Size 1.7KB
Processes 1072 (lsass.exe)
Type SVG Scalable Vector Graphics image
MD5 cb3c86675aac6c157ff384b723d3b430
SHA1 57a3c9d8737f4a29bdb940e9d4db2df1f5bee637
SHA256 61b2200490495b88963845f73e131455f43426d5f814d7b69e6ba414a17c2cfa
CRC32 1510D76B
ssdeep 24:t4CprGJAhlvnpHn+MULuHOIZWCqjoegvcWWsR32WZDrGL19TwZsCah87VJmChrGy:hGeeIHLxqjuvcWFW5+kyzgDh0DdhsU
Yara None matched
VirusTotal Search for analysis
Name ffce3cd4069d4559_view-mirror-symbolic.svg
Submit file
Filepath C:\Users\test22\Murraro\Iltningers92\view-mirror-symbolic.svg
Size 1.7KB
Processes 1072 (lsass.exe)
Type SVG Scalable Vector Graphics image
MD5 bd526c38c3464d62335d3a11af60c0c1
SHA1 ca183cadffbaf46c2b290a148d15ec2058e7bf56
SHA256 ffce3cd4069d4559b0bdd8b990f8ce3f1270de831c72e64508e8ec3dad588411
CRC32 EB697172
ssdeep 24:t42ihEb8N6zI9RdOyKbRAecFxMGMatMVJRSS+08VyKbRAecFxMGM+KtME:cXQk9iNtAecFJMnGNtAecFJM3
Yara None matched
VirusTotal Search for analysis
Name d1aed57927c78919_misforstaaelsens.anc
Submit file
Filepath C:\Users\test22\Murraro\Misforstaaelsens.Anc
Size 248.6KB
Processes 1072 (lsass.exe)
Type data
MD5 56b6c24bc575eb6bb69848dcb7444b89
SHA1 1711691f310a5b668f8b47a7b3361b931eea9515
SHA256 d1aed57927c789190a36ccbd84b8c31bb657b8d86b67d51c90cb77d8e991073e
CRC32 C6A54EB7
ssdeep 6144:3v6LXXea1YYl4RmhAcMd6a35JBUfp3tuBqFgSVP+qoJ:3v6LneabacM/3Op3tuUFvt4
Yara None matched
VirusTotal Search for analysis
Name 6fca9f75d7178dae_shortcuts.xml
Submit file
Filepath C:\Users\test22\Murraro\Fles\Underfaktureringen\shortcuts.xml
Size 1.5KB
Processes 1072 (lsass.exe)
Type ASCII text, with CRLF line terminators
MD5 ced25ee505bcdbb49617cfd06e892d25
SHA1 32fd13879d7b1f341655c8d6d9d72ba0856e9105
SHA256 6fca9f75d7178daec64638a3294c478651b9f9286a9d8a368bc70bcedd19b8fd
CRC32 ACE02F5E
ssdeep 24:qlnlR2q9Hzfo+S+J6cq6ybcVVR8aZ4D6eR8pZoT/GAR8zb+uWKh8xCFWoi:ML0JvcqFgV3SdCoT/G0abrn8QFDi
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_nswC03E.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nswC03E.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis