Dropped Files | ZeroBOX
Name 8951f1b70412949c_commonservicelocator.dll
Submit file
Filepath c:\program files\autoclicker\commonservicelocator.dll
Size 9.5KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e5f3b59ab9fd9157857d69b3d9611d0b
SHA1 057db8a55c224569a192f24c88f7cf0af02dd9bd
SHA256 8951f1b70412949c6ac5f5a73441e689d954522ee199f17f56c97d3c90908afd
CRC32 41CDD8DE
ssdeep 192:RVtbOf3jdnqSoG4MUzGRxHjgiqyOwFRc/giW:RVtaf3jP4MUzOxHjgiqPYiW
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name c5be08ce2fb67a79_serilog.sinks.console.dll
Submit file
Filepath c:\program files\autoclicker\serilog.sinks.console.dll
Size 35.0KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 f526bdf426addec5f78065eb870d9058
SHA1 71062e45cc998965e3d0a5b34661e44f30f96938
SHA256 c5be08ce2fb67a7937669cb878134b2832c725ef8f07de7577c150efaad5d1a2
CRC32 7B02BB51
ssdeep 384:ULeNXtBLFiEzbsTnF4HBhSoP9xc0So6vY3d+G8ic2g2223TXLd/KU2S/+fy1anrP:WeNXtB/SoeK7XB/KSp3uXEZK2ZT+
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 6a05921b9f60a78f_icon_running.ico
Submit file
Filepath c:\program files\autoclicker\resources\icons\icon_running.ico
Size 66.1KB
Processes 1440 (GKPXAP.tmp)
Type MS Windows icon resource - 1 icon, 128x128, 32 bits/pixel
MD5 4f1487da2dd64f4313c3520b80ac81da
SHA1 1217a1adf889220292b8a924ce6f71cb3bb98b17
SHA256 6a05921b9f60a78f928b95382dd3005c8c3217851c43090e12965415299d0ebb
CRC32 90BC8DD1
ssdeep 96:iiIitw4Y+OFNjLoWGIlTL2FPEN+YswsfTnnI9Q:64w4LeM+/y0Q
Yara
  • icon_file_format - icon file format
VirusTotal Search for analysis
Name accccfbe45d9f08f_system.buffers.dll
Submit file
Filepath c:\program files\autoclicker\system.buffers.dll
Size 20.4KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 ecdfe8ede869d2ccc6bf99981ea96400
SHA1 2f410a0396bc148ed533ad49b6415fb58dd4d641
SHA256 accccfbe45d9f08ffeed9916e37b33e98c65be012cfff6e7fa7b67210ce1fefb
CRC32 959571EB
ssdeep 384:/rMdp9yXOfPfAxR5zwWvYW8a2cyHRN7vCvlbLg:/rMcXP6N6e
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 3e4ef152246eb9d1_microsoft.practices.prism.dll
Submit file
Filepath c:\program files\autoclicker\microsoft.practices.prism.dll
Size 149.8KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 1488c726a98f80c3ddc6a1d00a8d0b8b
SHA1 824ad1174e5c2fc5c68b04e68c39c35e1bf4e812
SHA256 3e4ef152246eb9d1ebf58c2bb93ea038232afa0c1df03b6d3a9e398620938759
CRC32 DFA071E3
ssdeep 3072:qu0soBU/+xoVLg1B217f0w08hwU0I6hsKuMt+PA84Hz:qu1Vc1E7f0rUl8s0t+nQ
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name a22e09986a09839d_system.runtime.compilerservices.unsafe.xml
Submit file
Filepath c:\program files\autoclicker\system.runtime.compilerservices.unsafe.xml
Size 17.6KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 aa2cb9ba14481a623ee20f821cf5d180
SHA1 8b27d2b07845a94aa7741093e8a4d6d2e7b768df
SHA256 a22e09986a09839dc697f13d76aaded6008001f3632986acaebc29f8ef489b82
CRC32 F5E4337E
ssdeep 384:Y/uXudyvB0fmkcdZKyQe1EyriJriurs8rs1VwFaFDJOeOiKFIxRkj1r:Y/AEwafmkcdZbQe1EyriJriurs8rs1Vm
Yara None matched
VirusTotal Search for analysis
Name 0ae6be9b8d7ba5b2_serilog.sinks.file.pdb
Submit file
Filepath c:\program files\autoclicker\serilog.sinks.file.pdb
Size 10.6KB
Processes 1440 (GKPXAP.tmp)
Type Microsoft Rosyln C# debugging symbols version 1.0
MD5 f1af59548261be14dd1a0d5a10cadec0
SHA1 411c5eb1b529aec73f6a246ab965c25248701e14
SHA256 0ae6be9b8d7ba5b2d7ad09c9a0c2439671d6d419211199a86c3c6722e9fa6cf9
CRC32 A6E168F2
ssdeep 192:gB4d7haGWdGXY5JKhX9FdoMD1ATVVaCRd2Ahg48Z0aZTojArYEwhKlZ2KYDRr1Ak:gQ78ndTJKvFq+kVoCRddhuZMUMEw0Heh
Yara None matched
VirusTotal Search for analysis
Name ae2c3de9ad57d709_system.numerics.vectors.xml
Submit file
Filepath c:\program files\autoclicker\system.numerics.vectors.xml
Size 179.2KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 95dd29ca17b63843ad787d3bc9c8c933
SHA1 1a937009a92b034edb168cfac0ec1c353be8f58e
SHA256 ae2c3de9ad57d7091d9f44dcdee3f88eccf2ba7cb43adc9bb24769154a532dc7
CRC32 127F6E20
ssdeep 1536:azQgQfMzpKGPqMGFY3lF8YzA2HrYJtJZJ9JaGf4AscoqrbuC4BqaiaIacasa7c1E:azafMDl4LfX3MIg+QDB
Yara None matched
VirusTotal Search for analysis
Name fc7cb577061feeb6_serilog.sinks.console.xml
Submit file
Filepath c:\program files\autoclicker\serilog.sinks.console.xml
Size 16.4KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
MD5 ebe0a1e5f2373700ef7057643c50b52f
SHA1 c89bf980c47eed5d954a4d8b2612d22109f4c555
SHA256 fc7cb577061feeb6a06c24207b0ba1d5f5cfd6abd4f8d15cdcf54469067f13de
CRC32 4B17969E
ssdeep 384:lrqH3zEY2IbFbmYJP9d5nXPpUcbVDLiDRAAhce3AsVmxXD4XCWOBvuCJj3E+8ygJ:wRdPxgLJx
Yara None matched
VirusTotal Search for analysis
Name 5337a07c7aa7dd90_serilog.sinks.file.xml
Submit file
Filepath c:\program files\autoclicker\serilog.sinks.file.xml
Size 43.0KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
MD5 28d966ede9c3c25cf49e1f20d9aa6847
SHA1 b154321576f50bf8c0e27e940da030842b580d8e
SHA256 5337a07c7aa7dd901a330c893c7d1b6f101ab3706b7aab8cc3eaf4e5c236d9f7
CRC32 CBA7024B
ssdeep 768:TJXdJamCJaIfJyqJKP3VT2uixgJgXOUB0nKfRx8DhSn:DV4
Yara None matched
VirusTotal Search for analysis
Name 975a9555f561b363_system.threading.tasks.extensions.xml
Submit file
Filepath c:\program files\autoclicker\system.threading.tasks.extensions.xml
Size 9.9KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 c89e735fcf37e76e4c3d7903d2111c04
SHA1 3c0f1f09c188d8c74b42041004ece59bbd6f0f56
SHA256 975a9555f561b363c3e02fd533f6bf7083aa11bbc7cbf2b46c31df3d3696b97b
CRC32 C6350D0B
ssdeep 192:1/elWY3f207pbNcYDLna8MMOOXzHMfHuHoLob+OoMuJkfYSiffiWje0seJme0seM:1/2d207pbNc2na8MMOOXzHMfHQoLob+N
Yara None matched
VirusTotal Search for analysis
Name 8e76318e8b06692a_system.memory.dll
Submit file
Filepath c:\program files\autoclicker\system.memory.dll
Size 137.9KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 6fb95a357a3f7e88ade5c1629e2801f8
SHA1 19bf79600b716523b5317b9a7b68760ae5d55741
SHA256 8e76318e8b06692abf7dab1169d27d15557f7f0a34d36af6463eff0fe21213c7
CRC32 0881E5B7
ssdeep 3072:IUGrszKKLBFa9DvrJGeesIf3afNs2AldfI:jBFd3/aFs2
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 2c7435257690ac95_system.text.json.dll
Submit file
Filepath c:\program files\autoclicker\system.text.json.dll
Size 347.4KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 38470ca21414a8827c24d8fe0438e84b
SHA1 1c394a150c5693c69f85403f201caa501594b7ab
SHA256 2c7435257690ac95dc03b45a236005124097f08519adf3134b1d1ece4190e64c
CRC32 98B9E981
ssdeep 3072:USOCU3QYmd1QhS1h2pCUoUJeXq7YAAEP1VIGm/0aW/49rZbpQ2M6R:Q7MQMh2pCUreatAJhrZlh
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Is_DotNET_DLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 0d3e3c266198d8f6_keymappings.json
Submit file
Filepath c:\program files\autoclicker\resources\keymappings.json
Size 13.2KB
Processes 1440 (GKPXAP.tmp)
Type ASCII text, with CRLF line terminators
MD5 9086691d3237737d380505930380e319
SHA1 705d51d6a5059b42fa859ca996db63f5205a403b
SHA256 0d3e3c266198d8f68460ec522d2d3915f487afde3dbbf72a052157b2e13374da
CRC32 A6CF4209
ssdeep 48:PsH5U/s9uR/s+g4/sQe/sWn/sLNn/sVgf/sUk/sPa/s7X/s5vaj/sWw/sHyZ/slp:5GNnQIxwJ3iEfcVopXrv7ECbhX
Yara None matched
VirusTotal Search for analysis
Name cb02784d481cda25_autoclicker.pdb
Submit file
Filepath c:\program files\autoclicker\autoclicker.pdb
Size 137.5KB
Processes 1440 (GKPXAP.tmp)
Type MSVC program database ver 7.00, 512*275 bytes
MD5 5086f8c321e89b4088a26e4a72396eb2
SHA1 ecf3b883fb30838f1b36ef5d78351f13ebcc3eca
SHA256 cb02784d481cda2597fc1a1cd2c51d850548256c775f67418dbd203745dada10
CRC32 2A9975A5
ssdeep 768:R+Hepyt9D0maUsGGtSuv+89sfxxRU+w7s/7X0cwV8CG8YpKvtGB1GvLgJE8lgqIe:aiG8YYVGBQvsPIlq5q8jQzcAu7
Yara
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name acd8804789b64e20_gkpxap.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-59N8U.tmp\GKPXAP.tmp
Size 3.2MB
Processes 1700 (GKPXAP.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 bcf1478e2217221b21eec151c1799dc0
SHA1 d4e92222158d356a59741c14f0d245f98e5b64de
SHA256 acd8804789b64e208243881da188f779d90b93675c46917bc51fb2f8cdad725b
CRC32 A6F8F721
ssdeep 49152:CdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQ5333Rp:0JYVM+LtVt3P/KuG2ONG9iqLRQ5333b
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name c37e163fa76629c1_system.valuetuple.xml
Submit file
Filepath c:\program files\autoclicker\system.valuetuple.xml
Size 142.0B
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 b6e60687ae5db6d011e21e6993620745
SHA1 b117c6bbddc72e7f4b590173992ee17bfdde4be1
SHA256 c37e163fa76629c196460c7b4d54e95b1a46a4c66ab7b6f3311959c8137dc5f1
CRC32 75267AAA
ssdeep 3:vFWWMNHUz6GbC/0tFFNu7WRtLz3hAbS9/FFNrGMH/xtgGM8Xby:TMV06GbSWVVR+SXNffgp8Xby
Yara None matched
VirusTotal Search for analysis
Name c559fd909c052bb6_autoclickerupdate.bat
Submit file
Filepath C:\Program Files\AutoClicker\AutoClickerUpdate.bat
Size 89.0B
Processes 1440 (GKPXAP.tmp)
Type DOS batch file, ASCII text, with CRLF line terminators
MD5 86125fafcf3a7c569c9629e77d4f1caa
SHA1 6aa1981e114f00d13d2109ecd45145de65dd895e
SHA256 c559fd909c052bb65c009129ca29ae6cc2023f8446e59ed4bea92e2a35865446
CRC32 5BFB69A4
ssdeep 3:mKDDVBF7fDZjKYGOJSzGOtdIymovga0Vn:hxXGO2GOtm0vgDVn
Yara None matched
VirusTotal Search for analysis
Name 4aace8c8a330ae84_system.windows.interactivity.dll
Submit file
Filepath c:\program files\autoclicker\system.windows.interactivity.dll
Size 39.0KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 3ab57a33a6e3a1476695d5a6e856c06a
SHA1 dabb4ecffd0c422a8eebff5d4ec8116a6e90d7e7
SHA256 4aace8c8a330ae8429cd8cc1b6804076d3a9ffd633470f91fd36bdd25bb57876
CRC32 490DC598
ssdeep 768:6MazwAgR8/XJ665bKZdxuB8DCuL5enM7JxKjuMlZCZN+R0E7E:63wBccZdxuB8mQen6JxKjrlMZgR0Eo
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 1d3ef8698281e7cf_system.numerics.vectors.dll
Submit file
Filepath c:\program files\autoclicker\system.numerics.vectors.dll
Size 113.1KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 aaa2cbf14e06e9d3586d8a4ed455db33
SHA1 3d216458740ad5cb05bc5f7c3491cde44a1e5df0
SHA256 1d3ef8698281e7cf7371d1554afef5872b39f96c26da772210a33da041ba1183
CRC32 0A801312
ssdeep 1536:nPOw0SUUKw+GbgjMV+fCY1UiiGZ6qetMXIAMZ2zstK/hV+sUwS:nWw0SUUKBM8aOUiiGw7qa9tK/bJS
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name e905d102585b22c6_system.valuetuple.dll
Submit file
Filepath c:\program files\autoclicker\system.valuetuple.dll
Size 24.6KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 23ee4302e85013a1eb4324c414d561d5
SHA1 d1664731719e85aad7a2273685d77feb0204ec98
SHA256 e905d102585b22c6df04f219af5cbdbfa7bc165979e9788b62df6dcc165e10f4
CRC32 E786300A
ssdeep 384:VyPa16oAL4D+wW9IWmDIW4IWYDMFm0GftpBjMIraQHRN7VlmTpF0:VWs6oqDjADKeDYViG+LN
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name b4081575fc966685_autoclicker.exe
Submit file
Filepath c:\program files\autoclicker\autoclicker.exe
Size 218.3KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 fbb39c9ab4e8750ceda72439edc32d58
SHA1 ec497d1748df582fb8bfc7be8aad30eda688f7d9
SHA256 b4081575fc966685629d2ddf0122ef4fb46e55139475a4d48781d7316d8a4d11
CRC32 CB6C6E73
ssdeep 3072:R1bSqE6dTtAA76h0Uk8BxvwxFA30mfrBgokFjq:pE6nz6+d8BxL9g/I
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name dda6ae13aa1736b2_system.text.json.xml
Submit file
Filepath c:\program files\autoclicker\system.text.json.xml
Size 238.3KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 fed072426e07dbc27a1d734d99526654
SHA1 2282862d21fdc500cf34cd20b928e8888d662fd0
SHA256 dda6ae13aa1736b29ac98109b7334d70081dd907a7ad6890c265a552d2da03b6
CRC32 DA3748F5
ssdeep 6144:rKgZj52PhcHibdBvYJgP4aqKiOG0GYQYEu:shcu
Yara None matched
VirusTotal Search for analysis
Name d5714c96607eb1a9_system.memory.xml
Submit file
Filepath c:\program files\autoclicker\system.memory.xml
Size 13.6KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 add19745a43b2515280ce24671863114
SHA1 cf44e6557fde93288ff2567a002a69279965caba
SHA256 d5714c96607eb1a9d0f90f57ca194d8a9c3ede0656a1d1f461e78b209f054813
CRC32 90059A61
ssdeep 192:19SSrAVfjSE0wxiMiLiLiXdCjticiciAiJiziPNjNei5i9zhi+ipOUTJ:1gbXKKXppPmcPi6LmJ
Yara None matched
VirusTotal Search for analysis
Name 2d221f00ad119037_location-crosshairs-solid.ico
Submit file
Filepath c:\program files\autoclicker\resources\icons\location-crosshairs-solid.ico
Size 4.7KB
Processes 1440 (GKPXAP.tmp)
Type MS Windows icon resource - 1 icon, 256x256 withPNG image data, 256 x 256, 8-bit gray+alpha, non-interlaced, 32 bits/pixel
MD5 5363e77e69e003bcd8cde06f34c3c884
SHA1 8b364c849a4ea39d402f5b3bcded0166f6b275eb
SHA256 2d221f00ad119037fa63cd4e347c6cb9a2d48dc99614677e926cc4b5a1fc6c95
CRC32 07FA2721
ssdeep 96:UFbCPFvLVQle2X8P9JtjE6Bq8dkwHbvCghdrNkWrq5HXMG:UFbEvLm1X8P9UcLdkw7mWrq5cG
Yara
  • icon_file_format - icon file format
VirusTotal Search for analysis
Name 2ec7fb12e11f9831_system.buffers.xml
Submit file
Filepath c:\program files\autoclicker\system.buffers.xml
Size 3.4KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 1c55860dd93297a6ea2fad2974834c3a
SHA1 7f4069341c6b62ecfc999a6c2d8a2d5fb59d44f6
SHA256 2ec7fb12e11f9831e40524427f6d88a3c9ffdd56ccfa81d373467b75b479a578
CRC32 C13D11EC
ssdeep 96:1Sm9iVH4cK4bSrh4st9Y9TS7AilqqZw37EeKB+ZPZk:1Sm9iecnWrue8ildZw3QD+ZPZk
Yara None matched
VirusTotal Search for analysis
Name a52a88fea8cbfc44_autoclicker.exe.config
Submit file
Filepath c:\program files\autoclicker\autoclicker.exe.config
Size 565.0B
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 ccf2419187b9583166f17a82971d6ec5
SHA1 3bebb957e0544d7e745823cb4d2b3b9fffad8440
SHA256 a52a88fea8cbfc4465bfa4d520879c29c5f2366502db608f490b42a45658ee52
CRC32 4923933A
ssdeep 12:MMHdGGsVZreOJ9LNFF7ap+5iplp7qf/2/vLjFicYo4xm:JdArztPF7NQ7uH2/F9r
Yara None matched
VirusTotal Search for analysis
Name 075ce79e84041137_microsoft.bcl.asyncinterfaces.dll
Submit file
Filepath c:\program files\autoclicker\microsoft.bcl.asyncinterfaces.dll
Size 20.4KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 1ee251645b8a54a116d6d06c83a2bd85
SHA1 5dbf1534ffbff016cc45559eb5eff3dc4252a522
SHA256 075ce79e84041137c78885b3738c1b5a03547d0ae2a79916e844196a9d0ec1db
CRC32 B95090A5
ssdeep 384:69P2wZOXm7YJVHTe+0VJI0vrdaVemxO/f7vWeq/WIdHRN7bg30uw7lGsV9W+:u2zmYrHCV9cIL6TbtCSW
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 4f81ffd0dc7204db_system.threading.tasks.extensions.dll
Submit file
Filepath c:\program files\autoclicker\system.threading.tasks.extensions.dll
Size 25.4KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e1e9d7d46e5cd9525c5927dc98d9ecc7
SHA1 2242627282f9e07e37b274ea36fac2d3cd9c9110
SHA256 4f81ffd0dc7204db75afc35ea4291769b07c440592f28894260eea76626a23c6
CRC32 9F7C2735
ssdeep 384:1R973o62/KqcAnb05J3w0I5eUGef8s72XBWdvVW2JW8aJcyHRN7WEimpplex:1RZ4nNxnYTb6Blha
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name e82f59726374b3ac_microsoft.practices.prism.xml
Submit file
Filepath c:\program files\autoclicker\microsoft.practices.prism.xml
Size 380.2KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
MD5 65014c44702ca43a739bfe9688a84831
SHA1 c076f7c17bb076be64d833fe1b4c306b4e9a05ba
SHA256 e82f59726374b3acfa05b038c882b087f4a3cc91b5f2cc4ca3a5a8b0d0b60ba0
CRC32 8B1F37F3
ssdeep 3072:iiquJ1JLaJhnNCu9SikZPoZKHjApiqDtAbG56w2CEw:iE1JLaJhnNCuAikUiqDtV56w2C
Yara None matched
VirusTotal Search for analysis
Name 0772b7895a1fea1d_system.text.encodings.web.xml
Submit file
Filepath c:\program files\autoclicker\system.text.encodings.web.xml
Size 61.5KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 acc8af8d28dc65488d1c49defd8ea153
SHA1 1eece92a2f2e40de4afb43f7a5caec9a3b384b87
SHA256 0772b7895a1fea1d3bbee2ed2f5200ef4f9eb38b22c3d00b5405325be9d8a7cd
CRC32 5A7FF3A9
ssdeep 384:Yc32SgYGYofQhYLJkiBkN3/Ky7pkG05HaTwoIIMZpq/YbTbBnRE1Cd8PBdl+Y0TE:Y9fJvkNxwoIIMZxE1Cr0Md3wh7te4
Yara None matched
VirusTotal Search for analysis
Name 7a26a473af5eb7a0_serilog.dll
Submit file
Filepath c:\program files\autoclicker\serilog.dll
Size 123.5KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 0aa45a8a1cd24cd2b589e4aad925f35d
SHA1 0dc29954c4c2ffea4c33af0e56ce84158849b81e
SHA256 7a26a473af5eb7a00196e275c86d773f36e1d4caef566f97f1df7e07e20b1670
CRC32 FCBA49F3
ssdeep 3072:XfwtSQoXux2ogH8I/eXXXXXPXXXXXHXXXXXTaXXXXX14N0QXVsABFkNfM+HFukRb:PwtSQoXux2M3XXXXXPXXXXXHXXXXX2Xh
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Is_DotNET_DLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name ca53d9b1bbea04c3_microsoft.bcl.asyncinterfaces.xml
Submit file
Filepath c:\program files\autoclicker\microsoft.bcl.asyncinterfaces.xml
Size 17.8KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
MD5 0737b770ba5d854d4887a8f4d9c8de04
SHA1 40a8a356d807d71c102c91d68ad1a0ad6e3fdda6
SHA256 ca53d9b1bbea04c30db4186b015b7c57dce7c5ecdf1cfac9e4afe9ffcf6910f0
CRC32 F0EB517E
ssdeep 384:XgOpngSae6jWuTPP/xM2fB8qnmltJ5XZzRzgqW81Fu3DRmfCh7sE+siDBQsFaIs7:0FQa+TDm
Yara None matched
VirusTotal Search for analysis
Name edf13ebf2d45152e_system.text.encodings.web.dll
Submit file
Filepath c:\program files\autoclicker\system.text.encodings.web.dll
Size 66.9KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e8cdacfd2ef2f4b3d1a8e6d59b6e3027
SHA1 9a85d938d8430a73255a65ea002a7709c81a4cf3
SHA256 edf13ebf2d45152e26a16b947cd953aeb7a42602fa48e53fd7673934e5acea30
CRC32 C16A2A16
ssdeep 1536:czy/zOmekrEZa8frFpd3hQi/+sBzFLknqPO:TzOmekwZa8zdR+sBpSYO
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name c8f6500c2cd3d89e_serilog.xml
Submit file
Filepath c:\program files\autoclicker\serilog.xml
Size 283.9KB
Processes 1440 (GKPXAP.tmp)
Type XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
MD5 9286aa30eb743a001d67b100236e9011
SHA1 a476d5424129c7e40ec815a911313a71b92fe840
SHA256 c8f6500c2cd3d89e43a91d7c6e71c9480550be1f3f2b79874cfee6231d81b996
CRC32 71BA86BF
ssdeep 1536:iFOZzPSApaPVdO2FRP7QuNzlP3MpxbY1Qfw:iFOZzPSApqbMpxbYSfw
Yara None matched
VirusTotal Search for analysis
Name 3cadcb6b8a733514_system.runtime.compilerservices.unsafe.dll
Submit file
Filepath c:\program files\autoclicker\system.runtime.compilerservices.unsafe.dll
Size 16.4KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 9a341540899dcc5630886f2d921be78f
SHA1 bab44612721c3dc91ac3d9dfca7c961a3a511508
SHA256 3cadcb6b8a7335141c7c357a1d77af1ff49b59b872df494f5025580191d1c0d5
CRC32 23D92AA6
ssdeep 192:erLXx0hyLsbb3rxVj7WU2WLTYoW4GD5dHnhWgN7acWlbAkWD7DiqnajKs3WoHpZ:Ih06sbbVVPWU2WPY7dHRN77RGlGs3jJZ
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis
Name 388a796580234efc__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-JMQK9.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 1440 (GKPXAP.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
CRC32 2CDCC338
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name e186ab8fec275ee8_icon.ico
Submit file
Filepath c:\program files\autoclicker\resources\icons\icon.ico
Size 66.1KB
Processes 1440 (GKPXAP.tmp)
Type MS Windows icon resource - 1 icon, 128x128, 32 bits/pixel
MD5 a78008e9c55fcb98c9adf7e1263d8464
SHA1 46fa36020c1c70bf3649f66b92ce09e8d9a112b7
SHA256 e186ab8fec275ee81701bb161f4ef34c69f69419936c43505b5dcda6d4b9a248
CRC32 78F8791F
ssdeep 96:ndD8is8lmn78G276E85Z2zUH8lIE8lwp28z88lcz8m:h8b8H8X81Y8z8n8m
Yara
  • icon_file_format - icon file format
VirusTotal Search for analysis
Name 5b70dc2eeceb1963_serilog.sinks.file.dll
Submit file
Filepath c:\program files\autoclicker\serilog.sinks.file.dll
Size 32.5KB
Processes 1440 (GKPXAP.tmp)
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 c25357a7950dcfc7f85ee9d593cb1a24
SHA1 6a533712852465ab3c11b5c76004312d6482f07f
SHA256 5b70dc2eeceb1963f9c3690c1cc8ffa793b280e903fa9a31780e6a7bb0bdfcf9
CRC32 D09069BF
ssdeep 768:0E4c3g4vuh+t/j7zAJ0eBHdDaXRrbNoihV0gZ:2ktt/Hk2eCXR9/p
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Is_DotNET_DLL - (no description)
VirusTotal Search for analysis