Dropped Files | ZeroBOX
Name e3b0c44298fc1c14_nssF116.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nssF116.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 3e5c8d0dd2be1d04_qavvfooksso.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\cllhq\qavvfooksso.exe
Size 228.5KB
Processes 2740 (kdnrm.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 01413f955fba04a77046e285a07e47da
SHA1 212f2e29738be816c5d96fab2d2655edef619334
SHA256 3e5c8d0dd2be1d0408f66fa04105cb09dac7aaee574767b537d8916fffdc0b02
CRC32 A01ACA8C
ssdeep 6144:jZ6rLFluEpEl496mFZd8vX1vHppAO5nSmo:jYriEOlmy1vHX2mo
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 3d8fd33fa1762b17_mlikc.lf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\mlikc.lf
Size 118.7KB
Processes 2640 (madywarza2.1.exe)
Type data
MD5 c515acd40b1269fb3f969642b0d6d2ee
SHA1 ee55d175cf7476d34be955f289fc42c9bcb33df3
SHA256 3d8fd33fa1762b17e92e0e53c2782ba29df0a6b67954dacb04704e406fead144
CRC32 61F9F8CB
ssdeep 3072:bOTgktrHlq8vRrRlc44a111GfFEv3nYbrclHUeiMXwvS:bCggLx111GfFSXY/ctU3MXwS
Yara None matched
VirusTotal Search for analysis