Dropped Files | ZeroBOX
Name 824fae3331b95e2f_18068H0G
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\18068H0G
Size 40.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 41c19a9e8541fcb934c13c075bf47721
SHA1 648a7622d533d79b9a0bb31dc370134ec3a75ed7
SHA256 824fae3331b95e2f88ca60c87a6c9569086906ec76fc1db8d6dee9adddc4e80c
CRC32 560F7642
ssdeep 48:+35TqYzDGF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:Ulce7mlcwilGc7Ha3f+u
Yara None matched
VirusTotal Search for analysis
Name a651bab5fc27c49f_autC01F.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autC01F.tmp
Size 9.6KB
Processes 1020 (igccu.exe)
Type data
MD5 bdc966ebb162761379b046c91256ad47
SHA1 950dfa9a31dd2d15fd506c146b2900f0f40347d8
SHA256 a651bab5fc27c49ffd6e685b1ac5f293f4fb150fedb16882b178feab750d7138
CRC32 5F6B7EC2
ssdeep 192:65jwEiqiSLLhK6mXmHAMo0XrFZbHuAAAGVp200bAsmIr+C3VfO1qVZ/fJEsfY6iS:I6qin6OZ70XrFZbsp200csmIr+C300VP
Yara None matched
VirusTotal Search for analysis
Name fa319731bc339d4c_graff
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\Graff
Size 28.1KB
Processes 1020 (igccu.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 e9f7459ec4f4e9c43b4177fb28cac61b
SHA1 6d7180522c29bdf85812ad3aecfce59695db8396
SHA256 fa319731bc339d4c9db25fb292e91df383a8bd16d364802eadcd4f3a7455c4f3
CRC32 1A2A7A1B
ssdeep 768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbCO+IFh6q84vfF3if6gs:miTZ+2QoioGRk6ZklputwjpjBkCiw2Rj
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)
VirusTotal Search for analysis
Name 06ddf0a370af00d9_sqlite3.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\sqlite3.dll
Size 832.8KB
Processes 2208 (ktmutil.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 07fb6d31f37fb1b4164bef301306c288
SHA1 4cb41af6d63a07324ef6b18b1a1f43ce94e25626
SHA256 06ddf0a370af00d994824605a8e1307ba138f89b2d864539f0d19e8804edac02
CRC32 054B1140
ssdeep 12288:fpFFQV+FKJ37Dm+yY4pBkPr2v2meLaoHN/oBrZ3ixdnGVzpJXm/iN:fpnzFw37iDYIBkzuPcHNgrZ3uGVzm/iN
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 9fb7168694ebfa19_sqlite3.def
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\sqlite3.def
Size 5.0KB
Processes 2208 (ktmutil.exe)
Type ASCII text
MD5 248209b7183b5d5b667dfd77ee847763
SHA1 69b2ca31c9656e2b9bbb5a04cdb61047bed37f50
SHA256 9fb7168694ebfa19383de44ac8aa1b5341dea5fc228dc7cce8008c643807fdce
CRC32 7F411418
ssdeep 96:GcuN/gR+7Oc0XRMcCM3KOGOF++BlMtvr9NHY0ac:E/Q+7Oc0JKOBF++Evr9NHcc
Yara None matched
VirusTotal Search for analysis
Name 5cde9e3dbfa9f051_autC00F.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autC00F.tmp
Size 264.0KB
Processes 1020 (igccu.exe)
Type data
MD5 23d91bc6f8608c8d788890539b6127f3
SHA1 233692af0c89d215fb032d35c33190d19a581985
SHA256 5cde9e3dbfa9f051254881198aac9e3d103fde3e63780ed53f6a53a12c0e3e8b
CRC32 A452CEE7
ssdeep 6144:rEEH1wWcjagBK0m6Sh0Bi6+2Ed9j7p1yy/eU:rBVXIen6Sh7N2I97V2U
Yara None matched
VirusTotal Search for analysis
Name 413852f536628cfa_18068H0G
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\18068H0G
Size 40.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 91a39ee5267872c5a86c0b791bfd0fe0
SHA1 3ee10302a6d40c7aa02afe01d36498f1b27f7895
SHA256 413852f536628cfad0f6be985e814443f8a2bbdcfd55994aff9a561fbad68fe1
CRC32 B431A379
ssdeep 24:TL2C0RlPbXaFpEO5bNmISHdL6UwcOxvo5:TYLOpEO5J/KdGU1Eo5
Yara None matched
VirusTotal Search for analysis