Dropped Files | ZeroBOX
Name 777917d30f277a9e_qt5opengl.dll
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\qt5opengl.dll
Size 327.0KB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 c1d465e061d7d02895daeb19bdb28ac9
SHA1 5e729ee51df080545c7031d771b85094a2b2d4e9
SHA256 777917d30f277a9e88d8fc04e69b955a2b0bd3f2bcf2e36f7f9cffef2583ee60
CRC32 57BBC796
ssdeep 6144:JmuFcP82IqE5RSbvQpYVgMW2i32blpDW2pmoZ1:JmuFc02IqE7SbLVgR1O
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 8094af5ee310714c_msvcr71.dll
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\msvcr71.dll
Size 340.0KB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 86f1895ae8c5e8b17d99ece768a70732
SHA1 d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA256 8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
CRC32 35563170
ssdeep 6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name b20a8d88c5509811__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-57A35.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 2716 (getlab.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 526426126ae5d326d0a24706c77d8c5c
SHA1 68baec323767c122f74a269d3aa6d49eb26903db
SHA256 b20a8d88c550981137ed831f2015f5f11517aeb649c29642d9d61dea5ebc37d1
CRC32 21A57303
ssdeep 48:SvrzfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2piSS4k+bkg6j0KHc:+fkcXegaJ/ZAYNzcld1xaX12pTSKvkc
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 0ccc18e6ffe1abb3_unins000.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Nikko Video Capture\uninstall\unins000.dat
Size 4.4KB
Processes 2716 (getlab.tmp)
Type data
MD5 5db621c613f5c273a3c073bac7e1801f
SHA1 63ad72d5890661f79e4e15351dc35b1e12a4f91f
SHA256 0ccc18e6ffe1abb30e4795ca2147c50c6787032d3a40bacfefd1afaeaee281f0
CRC32 D4410782
ssdeep 96:qawdWIl4488GpZPw4wV97Z+eOIhzi4cVSQs0LqtaM:fwdWY448Jppw9AHIhPcVSQ1U
Yara None matched
VirusTotal Search for analysis
Name 2a62c66a297857f4_nikkovideocapture32_64.exe
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\nikkovideocapture32_64.exe
Size 2.6MB
Processes 2716 (getlab.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f38a682f1b4984cbb8c382194dade3de
SHA1 a070a3eaa176fc52d9d627aa1ccd3f2612145d15
SHA256 2a62c66a297857f487306edce6363a9e426eccf656403329b426cbce6cbb63f9
CRC32 EBD129C4
ssdeep 49152:Nk3P/ef1YrMhIIdMuOxminsiNj59noPSx:e/mfkMhIIKuOnnNo
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 7a16e6ed0c0a49ae_libssl-1_1.dll
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\libssl-1_1.dll
Size 702.9KB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 20b6b06bbd211a8acfe51193653e4167
SHA1 817d442b46dd6f35fd9641e0c7262c934ed76848
SHA256 7a16e6ed0c0a49aeb8ea4972600a7a1422c92550602a150634b1c221f79300b4
CRC32 4B68F22F
ssdeep 12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 5ae3da33b34f0f42_getlab.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-TJDH6.tmp\getlab.tmp
Size 691.5KB
Processes 2648 (getlab.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 84525eb8dc2455bcd578d9e688652a4f
SHA1 2ac8effb62d3bed39c8ab44bfdaaa9d1241ab378
SHA256 5ae3da33b34f0f426a48a2399ee746b5ae486815979552140e303ee3f81e7f91
CRC32 2363B530
ssdeep 12288:7QszP8NRMXpc/rPx37/zHBA66pE+4p1YR71CERdH6rN9by3HaOMe3mxyF:7QQP8YXpc/rPx37/zHBA6plp+51CErXP
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • mzp_file_format - MZP(Delphi) file format
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name b6192300d3c1476e_ssleay32.dll
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\ssleay32.dll
Size 382.9KB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 ee856a00410eced8cc609936d01f954e
SHA1 705d378626aec86fecfdf04c86244006bc3af431
SHA256 b6192300d3c1476ef3c25a368d055aa401035e78f9f6dbe5f93c84d36ef1fa62
CRC32 CA35C8B6
ssdeep 6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 63aa600a7c914c2d_libeay32.dll
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\libeay32.dll
Size 1.4MB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 a236287c42f921d109475d47e9dcac2b
SHA1 6d7c177a0ac3076383669bce46608eb4b6b787ec
SHA256 63aa600a7c914c2d59280069169cc93e750e42c9a1146e238c9128e073d578fd
CRC32 BCC879FE
ssdeep 24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-57A35.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name df96156f6a548fd6_msvcp71.dll
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\msvcp71.dll
Size 488.0KB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 561fa2abb31dfa8fab762145f81667c2
SHA1 c8ccb04eedac821a13fae314a2435192860c72b8
SHA256 df96156f6a548fd6fe5672918de5ae4509d3c810a57bffd2a91de45a3ed5b23b
CRC32 5A3B11D4
ssdeep 12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 2f6294f9aa09f59a__iscrypt.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-57A35.tmp\_isetup\_iscrypt.dll
Size 2.5KB
Processes 2716 (getlab.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a69559718ab506675e907fe49deb71e9
SHA1 bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA256 2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
CRC32 FB05FA3A
ssdeep 24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name a7de63ab8f2a78ea_unins000.exe
Submit file
Filepath c:\users\test22\appdata\local\nikko video capture\uninstall\unins000.exe
Size 702.7KB
Processes 2716 (getlab.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1021b867316977afa88cf97aa52e228f
SHA1 bea34b417448026f2580da9d0c6c5d4c832b2a92
SHA256 a7de63ab8f2a78eaa929498684ca57f83bf7e527d817517345420dde97d20966
CRC32 92CC4C33
ssdeep 12288:TQszP8NRMXpc/rPx37/zHBA66pE+4p1YR71CERdH6rN9by3HaOMe3mxyFd:TQQP8YXpc/rPx37/zHBA6plp+51CErXl
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • mzp_file_format - MZP(Delphi) file format
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis