Dropped Files | ZeroBOX
Name c7225ca6ca20be94_preferences
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Preferences
Size 132.4KB
Processes 2648 (Pensai.exe.com)
Type ASCII text, with very long lines, with no line terminators
MD5 bb37da32e3b597361d87f5b5331476e8
SHA1 7f0490578c1e31ac8afb82c30cd72e4d1ac11b9e
SHA256 c7225ca6ca20be943452a021dbe1b472ebeb42919a1099746b0a543e0322fc15
CRC32 966F3394
ssdeep 3072:YjHso1TDqLEbJ7gKcqwHcwvbBEe0TQpUBvZ8HyeSj/n1TTes1:mHso1vpMKobSnQpUByUveq
Yara None matched
VirusTotal Search for analysis
Name c879379224bc8dc4_13.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\13.vbs
Size 2.3KB
Processes 1376 (Vacillavo.exe.com)
Type ASCII text, with CRLF line terminators
MD5 193242114c1738d0ea04aa93659fdd5a
SHA1 a929cc1cfbe44ba8a99117dfd7819776ab45d465
SHA256 c879379224bc8dc4a4f495f989711714a936892b11e7a1cf6e7b79654dc8f928
CRC32 3D00BBC4
ssdeep 48:0MT7ObieFxfHjHT846dGCoWILIz7L6SdPZW:ZaFxPjIJGvW2QqSdo
Yara None matched
VirusTotal Search for analysis
Name ecf1617845b16931_autFF6B.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autFF6B.tmp
Size 5.0KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 ae9fe3f0da1b28d1692813e204304b28
SHA1 f48999cbefe2b29cfa70f43695968d19ddade507
SHA256 ecf1617845b16931c55eedf20dbb8703ff6ba4bafa56c453e0ab0ff2bb9ce480
CRC32 F4E878F7
ssdeep 96:UMgVsg754ArVFjzFPIyAjtZ8XYPeOT3a/vT32UC8lUIt9lZvZnI6U3kfm:UrZVtxPREtdC32nOUIbR3I
Yara None matched
VirusTotal Search for analysis
Name bd12190d36e94e0f_Tuttavia.vst
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Tuttavia.vst
Size 1.9MB
Processes 1764 (wechat-35355.exe) 2912 (Vacillavo.exe.com)
Type data
MD5 6b3bc6e77ac3dd50ef03ff082719680f
SHA1 140417c4386b0737956a721b1d9ab8d635b31c5e
SHA256 bd12190d36e94e0f49bc19f7d5815e34c9bf4cb1739fa2a69fe8c70a1d7af88b
CRC32 D55DFB41
ssdeep 24576:vIrpuGdKgXBR/g9e3lf/FdYUMtIUqlSdrQ4wyQDXQsh6JBI6TGT7WFUIuxol9Fek:grb5r/D3V/lSRQgQDgsUJBNSAcH1Vc
Yara None matched
VirusTotal Search for analysis
Name 490c84854174fa43_552.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\552.vbs
Size 2.9KB
Processes 1376 (Vacillavo.exe.com)
Type ASCII text, with CRLF line terminators
MD5 0884b6e1aaf279208fe5f97cbfa85276
SHA1 388f310a0d62a3362db22659e93cb6cb517c21b8
SHA256 490c84854174fa43f15d9ca2967578ed5aa614f5327ccccb5cb6ba589db3aeb6
CRC32 8BB7437A
ssdeep 48:0MT7ObieFx6xqHT846di8poWpD13RNVR4VWBp0AOgNgaG6G6pLVrntZ9:ZaFx6qIJi8GWFpDEmPRRBhtX
Yara None matched
VirusTotal Search for analysis
Name 237d1bca6e056df5_Naso.exe.com
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Naso.exe.com
Size 872.7KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c56b5f0201a3b3de53e561fe76912bfd
SHA1 2a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
CRC32 76090EE7
ssdeep 12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 49c4a85bce2fb8cb_d93f411851d7c929.customDestinations-ms~RFe5769d.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFe5769d.TMP
Size 7.8KB
Processes 3088 (powershell.exe) 3232 (powershell.exe)
Type data
MD5 4eba3b6a4f05a26106a2d772c79da044
SHA1 45ae375ea2f305e4409aabc22803cd1471f0983e
SHA256 49c4a85bce2fb8cb6db4279591d0966cbd2fb84bc43f252ee5ad14d3d615b2b5
CRC32 2DF7F691
ssdeep 96:YtuCaGCPDXBqvsqvJCwo9tuCaGCPDXBqvsEHyqvJCworM7HwxWlUVul:YtzXo9tzbHnornxo
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 1a1116aab11ed203_autA03C.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autA03C.tmp
Size 1.3KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 d17cd7f607d704be6abf54df45e96016
SHA1 cdd69e1ecef102294f4787a8dd89fb5a86eaa3af
SHA256 1a1116aab11ed203e9013541e2d5a06e33a8a95cf25f07a09e68e82e840c572c
CRC32 D5EDD2C2
ssdeep 24:nEwfqc0uk8YWtXwsEpuB8Cu9YD7T2aZz3FZOq20HmeyfPNVYY6fJW1fvOwDdqN:EWidWtXw/pnC8YqaVx2wmnPoFfJgew+
Yara None matched
VirusTotal Search for analysis
Name ee4f1c6f61c72321_Magra.vst
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Magra.vst
Size 872.8KB
Processes 1764 (wechat-35355.exe)
Type data
MD5 7871051e4a436b07dceeaafcfc0b2529
SHA1 dcd318d1ca03cb474aa8bf6cc1ee1e4c3bfc729f
SHA256 ee4f1c6f61c72321588166802c2013d51d8c4d8bc096ebec5508dbe376fbdbf0
CRC32 E9C24C89
ssdeep 12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:DT3E53Myyzl0hMf1tr7Caw8M01
Yara
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 563dd781dd63543f_195.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\195.vbs
Size 2.2KB
Processes 1376 (Vacillavo.exe.com)
Type ASCII text, with CRLF line terminators
MD5 e526da1842354849cfc018128001a6b4
SHA1 921f1ab5499eb550a351d4a394bd44df5d173ea5
SHA256 563dd781dd63543f7ee67747f044fbd77877cd46e34df7de1c96f287eeb39b14
CRC32 F343B939
ssdeep 48:0MT7ObieFxfHjHT846dWIoWILIz7L6SdPUa:ZaFxPjIJWpW2QqSdl
Yara None matched
VirusTotal Search for analysis
Name fad5d844d710593e_722.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\722.vbs
Size 3.8KB
Processes 1376 (Vacillavo.exe.com)
Type ASCII text, with CRLF line terminators
MD5 215a85f0ae3a8b5f6dbbbd18bfc01e9a
SHA1 2c7c7e0e420b8caa45e929d2aa343c29a7d7b6c4
SHA256 fad5d844d710593e62429d50cf91a75c80521fb3fe8e5e0296357f6f417c2cea
CRC32 5E7532D0
ssdeep 96:eMZrGPFyUNA56qFpAf99ijyRXI7bpYfv85pN1Ys8:5Z4FyUG5bAf9kjyRXI7F4vwNs
Yara None matched
VirusTotal Search for analysis
Name ac13be95005a84eb_secure preferences
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
Size 35.4KB
Processes 2648 (Pensai.exe.com)
Type UTF-8 Unicode text, with very long lines, with no line terminators
MD5 1945fe601456d5fd15a0f0da56f17a72
SHA1 49bc28bf3e92e5db61bdcac05a7099a0c74172a1
SHA256 ac13be95005a84ebd94f3b14cb3bc9f131e5da1f8bc885dd0cd89817c3acb549
CRC32 FACC1FE7
ssdeep 768:laJRugQc1xLlfM1kXqKf/pUZNCgVLH2HfLrUdRHnCq/oglO:iR1ZxL4nHnAl
Yara
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 759b841b3c2df20f_Wwc.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\Wwc.dll
Size 1.0KB
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 faf57c3faeec1b0c67af6ec37e92bb14
SHA1 d4c31fc1e3eec3784f21961349696f41c82fb535
SHA256 759b841b3c2df20f431d3cd0e90b8dbe5d33e3a60e59ec97c5fa285a08c68c0a
CRC32 FF7C822D
ssdeep 24:2dH4+S3vdwpdYd0xT1yL6Vh7hT43HVgOWtaFO69pn:cb2909kL6VdpeHVgOWtu
Yara None matched
VirusTotal Search for analysis
Name 8fc0fdda58a3668f_manifest.json
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hafajomdciknnfnhlbmonkdhhcfgcdhn\10.9_0\manifest.json
Size 1.2KB
Processes 2648 (Pensai.exe.com)
Type UTF-8 Unicode text, with very long lines
MD5 51200cd8a4def1f4c8c8dd69e513e644
SHA1 23324c396b15192f3d8fb8da676d9769822cdd58
SHA256 8fc0fdda58a3668f6ff8af3903b3119eba48300ce65205541e7093ac0e1215f9
CRC32 1D0EF130
ssdeep 24:CHLsbv0drFRMUasmoR3NSClmxO998GUmp+1A:ei01MUcC95m08LmpiA
Yara None matched
VirusTotal Search for analysis
Name a0bd8e259e4cc4c3_B
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\B
Size 1.1MB
Type ASCII text, with very long lines, with CRLF, CR, LF line terminators
MD5 5877b758e26c171bc2d69617c8af7d7a
SHA1 ba35ce2bf38b50352086835bfeb51dbd04866fa2
SHA256 a0bd8e259e4cc4c3ee22e4a0fcb24efdb68f08910383a7879759a129d30335f2
CRC32 20606B9D
ssdeep 24576:9HPvpWx+4/d50yTs9s9sUs6srsrs/sQsqsAsES9:9vvZyTs9s9sUs6srsrs/sQsqsAsES9
Yara
  • NPKI_Zero - File included NPKI
VirusTotal Search for analysis
Name dce3c5fba30c6653_Uccelli.vst
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Uccelli.vst
Size 386.0KB
Processes 1764 (wechat-35355.exe) 2312 (Pensai.exe.com)
Type data
MD5 634e944c0ca4cac6990d88fa305bfb04
SHA1 e48eb6a35e1f23310d11f52da845f6e64a63701c
SHA256 dce3c5fba30c66531ac9a37a62376cbd2f9d17f6fdb81d94b01af178fc55acd0
CRC32 9238BA16
ssdeep 12288:PlRddHIDwr4wzsZ5m+FzVw0xZ8sUfmDUhml:PlR/oDEyQ0zO0xlUfm2ml
Yara None matched
VirusTotal Search for analysis
Name f7d078e158d80864_autA794.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autA794.tmp
Size 882.0B
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 90a6b17adc2f59a75cdc3fc366ba7ba4
SHA1 6a7930dd88163f5c088cd968e6eedfc10ca5e8a8
SHA256 f7d078e158d80864dccad7e35d5e8fd080f846ce19726e5339e1e2c2f51b0e57
CRC32 6C661CBD
ssdeep 24:n+o8oRmIsDg1rykjNsxcBRyZh2Pw4myXx8XKR2V:+otRUDg1mSNCcJmCR2V
Yara None matched
VirusTotal Search for analysis
Name 61c1b397806ca627_Wwc.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\Wwc.dll
Size 944.0B
Processes 1912 (cscript.exe) 1376 (Vacillavo.exe.com)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 ce2fd4bb5d70fe292de57e87b758c503
SHA1 accdf7a84e8b8f6c4e88071a652c90a6dac5ae19
SHA256 61c1b397806ca62724e058b2df5bc166564d4683bbbf368f17d2f2fb90c2a10e
CRC32 3CFC4876
ssdeep 12:TMHdGa4+DWCOvCONsbOnksEpdDOfqZvljYCO0xMGTeSyL6ls1whowh/LO7sgPOLg:2dH4+S3vdwpdYd0xT1yL6Vh7hT4KbCpn
Yara None matched
VirusTotal Search for analysis
Name 1cfea42ded240b23_Talvolta.vst
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Talvolta.vst
Size 95.0KB
Processes 1764 (wechat-35355.exe) 1424 (Naso.exe.com)
Type data
MD5 84b8b6314434c18457211fcf2e31c3c1
SHA1 fb7081eae4d782fdf4e3a762fe5c7ab1a82b8bfa
SHA256 1cfea42ded240b239cbaeabf5a201c120c8b413739c840cbabc85b2532c511d9
CRC32 E866DA18
ssdeep 1536:fK2IT/zOOYDEaWo9hYOyvH/3SkDBZqT/CRHULlcHleJHOlH/nt4+/tUG0ry+u:QTKOYDioIOwHfv90/CR3HlOOlH/nHV6S
Yara None matched
VirusTotal Search for analysis
Name d43a2b171fbe2a0a_autA04E.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autA04E.tmp
Size 1.6KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 992b1c2f7ad4fb50abc99643f40dadf4
SHA1 38ffbfb56d0981bf689664aa279c4cc0d90500c6
SHA256 d43a2b171fbe2a0a0ef19d42e4a86b98d7804cb1d566cc24c5c7b28053d0da10
CRC32 F7E29BAB
ssdeep 24:nVuwfqc0uk8YWtdFxDOFM+fER+WdAFUwUMneTqGnVeva5IKxhDGzGokYpxv71X0:4WidWtdFlOS+o+A2xUMnMH+EDJ6pt6
Yara None matched
VirusTotal Search for analysis
Name 798af20db39280f9_rdpwrap.dll
Submit file
Filepath C:\Program Files\RDP Wrapper\rdpwrap.dll
Size 114.0KB
Processes 3320 (RDPWInst.exe)
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 461ade40b800ae80a40985594e1ac236
SHA1 b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256 798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
CRC32 CF004A91
ssdeep 3072:m3zxbyHM+TstVfFyov7je9LBMMmMJDOvYYVs:oMjTiVw2ve9LBMMpJsT
Yara
  • UPX_Zero - UPX packed file
  • IsPE64 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name cba9b840fccc043c_plink.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\plink.exe
Size 589.9KB
Processes 1376 (Vacillavo.exe.com)
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 a69a5f42dcb18bf37e800bf86b313b36
SHA1 3f2e4937339e8153898c2a354c443f4512f3f516
SHA256 cba9b840fccc043ca78994dfb7a55046f0fa865690ed9f8f227ab8b3615dd843
CRC32 BCCB8425
ssdeep 12288:C/byQRzOcpfpThVwYguDgcQ30QrfThASxvI9G4UQp8T/Jy8ZVOxCFHM7YfmMZX0W:C/vleDq9GtWWsCFHcomMZX0W
Yara
  • UPX_Zero - UPX packed file
  • Win32_PWS_Loki_Zero - Win32 PWS Loki
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name a8e58bd4f23c911f_autA050.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autA050.tmp
Size 2.9KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 a6cea54f3e0f763ca6b5ea862eafae17
SHA1 953cb5175e32ff8e72a8394678d82dbb96867cd3
SHA256 a8e58bd4f23c911f8098a9732f125c8302a05787c916d6aabbfa41581c57efef
CRC32 BBB98AA1
ssdeep 48:qjBRdV59IEpuM5QYInaN/ueL0g3O/rmCGv0Iyze3UCIZBAmClfmdVTIYL:qRfzgFTnaNme4ckiCGcIyzoB/NmjUS
Yara None matched
VirusTotal Search for analysis
Name 79173702b2b38b8f_rdpwrap.ini
Submit file
Filepath C:\Program Files\RDP Wrapper\rdpwrap.ini
Size 115.3KB
Processes 3320 (RDPWInst.exe)
Type ASCII text, with CRLF line terminators
MD5 3b18b58b5b9d32e1e8dc3d4f681227cd
SHA1 fd328b70f225a372903a3b36567779891f39dc32
SHA256 79173702b2b38b8f9ad86ca394f3e8921d01c1aa0c7cfb2f64a760e2f2726cdf
CRC32 CD23A1FE
ssdeep 768:0U6QVQv5UfUqQ2FSx8Rr/d6gl/+f8jZ0f4b7FAZTQPv95LIvuThtO9Oec+V:TMTyv95LIvuThtO9Oec+V
Yara None matched
VirusTotal Search for analysis
Name ac92d4c6397eb445_rdpwinst.exe
Submit file
Filepath C:\Program Files\RDP Wrapper\RDPWInst.exe
Size 1.4MB
Processes 1376 (Vacillavo.exe.com)
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 3288c284561055044c489567fd630ac2
SHA1 11ffeabbe42159e1365aa82463d8690c845ce7b7
SHA256 ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
CRC32 D5C50564
ssdeep 24576:prKxoVT2iXc+IZ++6WiaTAsN/3ebTvK+63CWH8iA/iD2hgPjcC8SVdKumYr7:EHZ5pdqYH8ia6GcKuR7
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Packer_Zero - Malicious Packer
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name f1b3b7b1fcb7e4a8_autA03D.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autA03D.tmp
Size 1.3KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 b36f2c60f18124097f22ca30da0dc30d
SHA1 4b66d215b94a6418ce027aac79a94e2cdb1d70ac
SHA256 f1b3b7b1fcb7e4a8cfa6300066057bf6c55f2ae0f3365f8481ee8f930263b6db
CRC32 EEE4C841
ssdeep 24:n1wfqc0uk8YWtXwsEpuB8Cu9YDEQ95SLzrCQt48Ksr0HyDX9hXKSOG7OaD2/:1WidWtXw/pnC8YoISLx48oHyDXbXpZ2/
Yara None matched
VirusTotal Search for analysis
Name 042ef6e3349edef4_tbgUJlYNtm.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\tbgUJlYNtm.bat
Size 1.4KB
Processes 1376 (Vacillavo.exe.com) 3068 (cmd.exe)
Type DOS batch file, ASCII text, with CRLF line terminators
MD5 6d19b2702b77a20b89818484cbc83506
SHA1 f42dbd3ab3c60ea9952e2a0f66826e153f89d943
SHA256 042ef6e3349edef436e425a5ec5d7c23f49a93f2866ae31c10ada08e9e012d5f
CRC32 F1FA44AF
ssdeep 24:2CYg1Yvc9Kl7cc8Jy27evtTykSvUvjrjaxV2MZKh+uTDsd5aTEubQubQaLUauEWZ:jd1SKJ1Jy3pyWHyp0sQUaw/iLHri
Yara None matched
VirusTotal Search for analysis
Name bca3013b394c19fd_T
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\T
Size 1.0MB
Type ASCII text, with very long lines, with CRLF, CR, LF line terminators
MD5 47865edbea4567c9795b1c49cd4c78ca
SHA1 0dddbd3098ffaf00393578f5561ecb09001142be
SHA256 bca3013b394c19fdaa8146c3097d44dfaeaaab726d6653e75ff3ec406a6c9a43
CRC32 3A8E6D13
ssdeep 12288:n6RGVFgDSHmvL7KpUgJHTPPg1I1CXGmhwb2PgbOt9VN/u:nekyNbGDyoOtLN2
Yara
  • NPKI_Zero - File included NPKI
VirusTotal Search for analysis
Name 7d0cb57ba7d2af6f_335.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\335.vbs
Size 2.2KB
Processes 1376 (Vacillavo.exe.com)
Type ASCII text, with CRLF line terminators
MD5 d427d2ed9db86d08b38f5f8b5eec4493
SHA1 5cfe9f751bad99009abf1a642eec8f7c67870051
SHA256 7d0cb57ba7d2af6ff75a9c203d1338ce31199d07eeca391e9a82fedcbe068512
CRC32 15F27EF4
ssdeep 48:0MT7ObieFxfHjHT846dboWILIziL6SdPLE:ZaFxPjIJMW2Q3SdDE
Yara None matched
VirusTotal Search for analysis
Name 56ec3bb307c6352d_Orlo.vst
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Orlo.vst
Size 839.0B
Processes 1764 (wechat-35355.exe)
Type ASCII text, with CRLF line terminators
MD5 cd8db6e405622b2c9b2d40b0e12635b6
SHA1 e06745b817a1304eac230bd2a9bdf1a962858ae3
SHA256 56ec3bb307c6352d5c0e8a7d83725361add6be69666af29e4f899261daf1781d
CRC32 46664006
ssdeep 24:zWXrEU9C0Mspfp1lOxCy5U9C0Mspfp1l4JU9C0Mspfp1lcf:zgrEiCTs71lOxn5iCTs71l4JiCTs71lG
Yara None matched
VirusTotal Search for analysis
Name 32bf0265f01ef795_autFF0C.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autFF0C.tmp
Size 672.4KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 c7576e21622ac3e025680ba86e0ad15c
SHA1 bb1f08375edc11e90b519bfae8dfcf15b26abcfa
SHA256 32bf0265f01ef7951a84f12be56f25c70284a2140bfea7c0653653676688b3d1
CRC32 261F7DB7
ssdeep 12288:+Ipnu62BiM5FpYtCEP0rSaFYTyXH0Nvuu3EICA4ttsG5x4XKC8Cs/zLtFq:pgtB75EP0rSayQ0pU/sMC+Fs
Yara None matched
VirusTotal Search for analysis
Name dc42333f20b3a524_1164.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\1164.vbs
Size 9.1KB
Processes 1376 (Vacillavo.exe.com)
Type UTF-8 Unicode text, with CRLF line terminators
MD5 fdc134c640049724853a14b692623719
SHA1 500ff9c4e30c34e4ab0ac0ce7c32e5f9116020a5
SHA256 dc42333f20b3a524dc7d7a1c3301188d36642fb077758c2ab4d824a0439ecd00
CRC32 2CAA1564
ssdeep 192:9FwfFxcV7S5y1Z87o0N8/TQ05yF/Bzb5cUxwRKB2:Cy1Z8km8/E5B2
Yara None matched
VirusTotal Search for analysis
Name 052a0f999f2a3553_K
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\K
Size 1.1MB
Type ASCII text, with very long lines, with CRLF, CR, LF line terminators
MD5 6eb1441b30f60f78d71fdfe5551d6255
SHA1 9901d4d52be2286181d4889c082cdf841f3595ca
SHA256 052a0f999f2a3553d50d5c898496e663050d02227b19ed8f3085e60dcbe1caed
CRC32 EBE4F170
ssdeep 12288:/DP8EvLvLiHLBL7TZc8HZ9c6caujwTYS+7TCdbzdzWlA9HIROV2vuyw37uQA9PuL:crBL7Q63ndzz9oRbnurvigbk4x
Yara
  • NPKI_Zero - File included NPKI
VirusTotal Search for analysis
Name 3864d823a8953a92_autA04F.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autA04F.tmp
Size 1.9KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 325908c2520e6027c0c963f1de80ba97
SHA1 df3c8033db3c4f4b3b040db607422fe50d5b2d5f
SHA256 3864d823a8953a9219e03b2bc970e27574d33177a4781ced2b42a3d22d08f057
CRC32 F7FF5D7E
ssdeep 48:/U3+FL9vAMz8VRsNmsl2qco1h/Kdpq7KfGv9Tl4L5kLH:/UcK2v/hKqzlTq1+H
Yara None matched
VirusTotal Search for analysis
Name a5176e32695b4aa8_Wwc.dll
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\Wwc.dll
Size 838.0B
Processes 2392 (cscript.exe) 1376 (Vacillavo.exe.com)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 5b85d9f13403255907570f9aa61ce547
SHA1 10952e39a5415231bd9dad84bf8cf6b99164145d
SHA256 a5176e32695b4aa8a03c72770c5f99c6ef0532fcd78ce6dca461bdf2ad64f45b
CRC32 E8107F77
ssdeep 12:TMHdGa4+DWCOvCONsbOn0EpdDOfqZvljYCO0xMGTeSyL6ls1whowh/LO7sgPOLAx:2dH4+S3vdjpdYd0xT1yL6Vh7hT4zpn
Yara None matched
VirusTotal Search for analysis
Name e970530af9bbf865_rdpwrap.bat
Submit file
Filepath C:\Program Files\RDP Wrapper\rdpwrap.bat
Size 14.5KB
Processes 1376 (Vacillavo.exe.com)
Type exported SGML document, ASCII text, with CRLF line terminators
MD5 f6537567c83a49f29d74c39ea1765164
SHA1 e8895b76a28836899802e51d9a40db0326535ae5
SHA256 e970530af9bbf865f4c7de8d113e522f5f32afd5c84f378d15bf073810507599
CRC32 FA4687BD
ssdeep 192:QWgSc3vKV00cBCm8wS+cA8UlUw4ycLHsW3JW213WwuygDy/XfIpFpt/kK+8y7/8:QFSevKHUCm8wS+l8Upp/2xzT/IN
Yara None matched
VirusTotal Search for analysis
Name 6084f385bc49aac9_947.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\KGYyvQq\947.vbs
Size 3.7KB
Processes 2820 (cscript.exe)
Type ASCII text, with CRLF line terminators
MD5 cdf421bd858804b7eb0dc875b33805a0
SHA1 de9b16fe6aaf5435d5dc1795d77c0e65df42ebae
SHA256 6084f385bc49aac95d01d964b1f555c290af4319636c7c6771dfedee3c59fe81
CRC32 554BE6F6
ssdeep 48:e2uIj7OFy4MTe/eey9f9SFu1TrhBwXqmdPmP8z7KeQR/P7nA4/J+aCSp4:eKaZMK/G19SFuMXVcP8vKeQZPTnBTp4
Yara None matched
VirusTotal Search for analysis
Name 931f4232fa881af9_autA02C.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\autA02C.tmp
Size 1.3KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 f9a790c0b11119359c3876592d16987d
SHA1 74a525b9a4e56b50a87d205137accc7ce67c5ec3
SHA256 931f4232fa881af9927e361f997bac1311e6f1d398667d9ae33324749d9a6a5a
CRC32 68A1D016
ssdeep 24:n0wfqc0uk8YWtXwsEpuB8Cu9YPp3XAjafZ4e2zol5BdFyvLZ3XngeI+Uc5oz:0WidWtXw/pnC8YPdXAjaf2EnSLZA7+UJ
Yara None matched
VirusTotal Search for analysis
Name c275bc55b1b7b1c9_aut2A25.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\aut2A25.tmp
Size 345.6KB
Processes 1376 (Vacillavo.exe.com)
Type data
MD5 7e6f567b5449459e086160b20a654d92
SHA1 b4e1a5462203f4a30508bc45491242c33162a8a7
SHA256 c275bc55b1b7b1c94156b4233f60e365bdb3f31ced6969305cfb5eccfe669db0
CRC32 7CF71281
ssdeep 6144:uHnvJxOH7RNcRDsrgk5TSqHXZ/QeY3Ey1SFj4CV6zOOJTwuVzOkwTC9G:+vT277cRDs5WqxQ/3Ey1GjGZJ7QTCo
Yara None matched
VirusTotal Search for analysis