Dropped Files | ZeroBOX
Name 6afa2d104be6efe3_innocallback.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\InnoCallback.dll
Size 63.5KB
Processes 2492 (vpn.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 1c55ae5ef9980e3b1028447da6105c75
SHA1 f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA256 6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
CRC32 85DF9C3B
ssdeep 1536:+VqUE7JhgAzj/ZuhnOwKWSAXvze/V2C0mswp91:gWgAnB3XDAqt/p91
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name b96b6977a6140a2b_image_install_logo.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\image_install_logo.png
Size 61.7KB
Processes 2492 (vpn.tmp)
Type PNG image data, 560 x 340, 8-bit/color RGBA, non-interlaced
MD5 f38a2a6d0bf5307dcd8dc8c44424f930
SHA1 04741c5be18221d9e86d0d62f857c48709402f34
SHA256 b96b6977a6140a2ba8c292a9fdaab03b8c85f022ab22f26fc3b637b0b26a7498
CRC32 9B68A2C2
ssdeep 1536:I9uNDrkIXLX7q5FDY8fncxZPQ0RAGJtusf4u:I9uN/BXD7UDJCZPp5Puu
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name da7d0368712ee419_botva2.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\botva2.dll
Size 41.0KB
Processes 2492 (vpn.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 ef899fa243c07b7b82b3a45f6ec36771
SHA1 4a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256 da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
CRC32 5BBF0304
ssdeep 768:DyNq+QImctzKKFyAE/PFqhezqSQrvYt4lYVuW0zMo4QHVoWyQK7OYwPPh:2Nq+QWJ7ds80mlde7s
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 93ffd0c0b164422f_vpn.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-DTEC7.tmp\vpn.tmp
Size 1.7MB
Processes 2408 (vpn.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2d136816152335b80991aefc4d5ddf8d
SHA1 c9cf142e99ee4c48f0cc1f42288289d4b21c3adb
SHA256 93ffd0c0b164422f8df1edff87deb6386619c995e4b2dca5bb95b028580b82bc
CRC32 9643B579
ssdeep 24576:6H9/gqpQYze0XKvc4BYCsCS3D4kjiIUjyeyXEDq8UbVlc3GYgl4KvjKwCjAFCjAS:SIEJxCWluyZ8UbM5jAsjAv6
Yara
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name a4c86fc4836ac728__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 2492 (vpn.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 4ff75f505fddcc6a9ae62216446205d9
SHA1 efe32d504ce72f32e92dcf01aa2752b04d81a342
SHA256 a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
CRC32 B1C5F7C5
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 2b7469d2f2305ccb_button_install.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\button_install.png
Size 3.7KB
Processes 2492 (vpn.tmp)
Type PNG image data, 240 x 152, 8-bit/color RGBA, non-interlaced
MD5 d6cbe926b339382e5856af4661354151
SHA1 93d23425b99e1e3a7f3ec5eb711bbeb6ffc4e03e
SHA256 2b7469d2f2305ccb890f4b00228a190b675fd723f21dcb0cf7a9cc2a06ffa7a2
CRC32 0F107AB6
ssdeep 96:MSMllcHitlIxv9vk7C1+I4wWHLihk/xbB6/W95uViZEPJnX:MSHIIHUCD4wa5BCJVaE9X
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 4b63e2ae62c42b36_button_minimize.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\button_minimize.png
Size 2.9KB
Processes 2492 (vpn.tmp)
Type PNG image data, 30 x 100, 8-bit/color RGBA, non-interlaced
MD5 1cccfb960555e423cd8a0684714d676d
SHA1 932157f11f213ec02acfd3296fe1a85f13705c7a
SHA256 4b63e2ae62c42b364669992531e04a990f30618d81ad1afd7512db19adad3a36
CRC32 B8FD00C5
ssdeep 48:o/6qbllck+itY5vm7I6Wzv9UAOb57C1cSMIg6lc3d+0UWHdVG/jJtFo3/d7xSkS:oSMllcHitlIxv9vk7C1+I4wWHLihk/xe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name ccf1d09954147e0e_button_close.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\button_close.png
Size 705.0B
Processes 2492 (vpn.tmp)
Type PNG image data, 30 x 100, 8-bit/color RGBA, non-interlaced
MD5 492e8ff960b1bc2616c03e5035eb6376
SHA1 badc67a94f6eb8c767b3784bb3f4fc2bad58fb4c
SHA256 ccf1d09954147e0e30181af3bc4a4fcefd465bd6aa6a7f94b84eaa2795952eb6
CRC32 FF93D03D
ssdeep 12:6v/7zTPl2FRS++sVLrH0nqvkbdphHkHo2mVFJgiqTdjG8X03DTqNlfrOARSLtN:ST2THsyGdjEBwkNTdjVyTMfDOtN
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 69cb3ebbf5fe619d_button_checkbox.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\button_checkbox.png
Size 3.1KB
Processes 2492 (vpn.tmp)
Type PNG image data, 15 x 120, 8-bit/color RGBA, non-interlaced
MD5 5ecf75ff3f915320ea9e051e85a84c67
SHA1 cd5bb9d03fd4abc2f7236986ddc14ac3d0753b99
SHA256 69cb3ebbf5fe619d6f290597c32d88846aa9b218107255a54aaa8271ebe88f71
CRC32 1302D6C2
ssdeep 96:hSMllcHitlIxv9vk7C1+I4wWHLihk/xESXl:hSHIIHUCD4waVl
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name fb801b50a64fd187_button_browser.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\button_browser.png
Size 861.0B
Processes 2492 (vpn.tmp)
Type PNG image data, 66 x 104, 8-bit/color RGBA, non-interlaced
MD5 76fb1693af9afa4fe3d1f89e58a464b7
SHA1 6a76368b793266d0c2aaef7482ebcbfd47c91383
SHA256 fb801b50a64fd187a8b49b55406989b8fcc61f76146a3f840fca2116ab26fb37
CRC32 C14C35C4
ssdeep 12:6v/7LyZcbGZQdta2Uoff2E/uB0q7Lqt2oT1FIgizwBNfcfwpRgNQe54yWzJP:HciKdwCf2E/uNXCfTwgiz89c6KuMVWZ
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 6929f6da490b9f5c_button_customize.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\button_customize.png
Size 4.1KB
Processes 2492 (vpn.tmp)
Type PNG image data, 90 x 120, 8-bit/color RGBA, non-interlaced
MD5 0d5287d3e74e12619ee0ee561edb1937
SHA1 02bae16e800233e6bbbbc20e8e6219b69b109bff
SHA256 6929f6da490b9f5c0a3277975c23a309cd2c8516dba9fbe1de1300d7fc729efe
CRC32 824774FB
ssdeep 96:lSMllcHitlIxv9vk7C1+I4wWHLihk/xHf6hILPTDkpAP79jPLCiz:lSHIIHUCD4waN3LPPKAP7tPdz
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 2492 (vpn.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
VirusTotal Search for analysis
Name 5bccb86319fc9021_libmaskvpn.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\libMaskVPN.dll
Size 2.3MB
Processes 2492 (vpn.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 3d88c579199498b224033b6b66638fb8
SHA1 6f6303288e2206efbf18e4716095059fada96fc4
SHA256 5bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
CRC32 2F765C4A
ssdeep 24576:kQu9k/+XwST8oE46nDTDcPB+cxENBySNZjYzqdA1wHanrzEfcln8JIaIvufnXs:QXwsSD04NISXYzqannZ+I98c
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 2900d536923740fe_apitool.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\ApiTool.dll
Size 959.4KB
Processes 2492 (vpn.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
MD5 b5e330f90e1bab5e5ee8ccb04e679687
SHA1 3360a68276a528e4b651c9019b6159315c3acca8
SHA256 2900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
CRC32 384C4E71
ssdeep 24576:V3tkAn6E+TuSVqyXvmZexbpU3QCbJhrVLk47Vl3e6y+XV27:RP6HiSMyOQppUQCrV/7D33V27
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
VirusTotal Search for analysis
Name 3146ff67f18f01ff_edit_background.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\edit_background.png
Size 458.0B
Processes 2492 (vpn.tmp)
Type PNG image data, 298 x 24, 8-bit/color RGBA, non-interlaced
MD5 971f9cd6f860fa9a69f2729f621f1d3b
SHA1 93b7e12547ca7365b935278340774ee7274266c6
SHA256 3146ff67f18f01ff28ceaf36189094fafa01bcfff9ac68a6b3fb53de7bdc3cc8
CRC32 9080111D
ssdeep 12:6v/7nGtdKqqbuf1OsSKwvq0ZCTnVHMOro3kFhWc:uGuqtO8QBMo3kX
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name f694cc21bace3afa_progressbar_foreground.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\progressbar_foreground.png
Size 3.0KB
Processes 2492 (vpn.tmp)
Type PNG image data, 520 x 3, 8-bit/color RGBA, non-interlaced
MD5 3cfbcab19d1faf241a4a0af8a04f06c5
SHA1 8573be23a70f1645caecff3ca0f41f2dd9f750e9
SHA256 f694cc21bace3afa188483c3d0d6f3b93c90cdc6a306d7bbd9a35dacc758333b
CRC32 B1FE4A7B
ssdeep 48:Y/6qbllck+itY5vm7I6Wzv9UAOb57C1cSMIg6lc3d+0UWHdVG/jJtFo3/d7wHQv:YSMllcHitlIxv9vk7C1+I4wWHLihk/xl
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 1282b6ac8eff1cdf_background_wizardform_normal.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\background_wizardform_normal.png
Size 1.9KB
Processes 2492 (vpn.tmp)
Type PNG image data, 560 x 400, 8-bit/color RGBA, non-interlaced
MD5 f71d5b564de9dadbf2d1a61370273c1e
SHA1 bc6611244d993aab97f0c66b77fecebdc0c3e77d
SHA256 1282b6ac8eff1cdfe3a24d9c945bad30e67086dd674d3456111477f06ef5719c
CRC32 27944DEF
ssdeep 24:6OyiLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmLmJz:1yGzlg1
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 4bbf00f2d30951cc_image_wizardform_logo.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\image_wizardform_logo.png
Size 28.1KB
Processes 2492 (vpn.tmp)
Type PNG image data, 330 x 96, 8-bit/color RGBA, non-interlaced
MD5 042c062ff9bb0e02519755c1c89d3f61
SHA1 84855a3062714d1ed526674b2405c8ed2402f314
SHA256 4bbf00f2d30951cca4be2ee904fd068cf4561b413984044ab7e88b2eac005192
CRC32 2453D0D1
ssdeep 768:BOr30kCzHlocBrrhwZnFtzrik5S2lRmgFz/BjH:UrmGga0ks2lzLBjH
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 31d75aa807c4fe91_background_wizardform_large.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\background_wizardform_large.png
Size 2.0KB
Processes 2492 (vpn.tmp)
Type PNG image data, 560 x 440, 8-bit/color RGBA, non-interlaced
MD5 19b010ecc1f4d3b811f47593103c3c08
SHA1 6f312c3addecce1541f13a5a78a7341cc49f057d
SHA256 31d75aa807c4fe917d2ba440cf3b97bc0ac2b92ed39f701dc14101d96a31d02f
CRC32 386B8BE9
ssdeep 48:nIJwllllllllllllllllllllllllllllsB+llllllllllKlllllllllllR:IBH
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name ab49b745a5230767_progressbar_background.png
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-B4S06.tmp\progressbar_background.png
Size 2.7KB
Processes 2492 (vpn.tmp)
Type PNG image data, 520 x 3, 8-bit/color RGB, non-interlaced
MD5 0dd63836a6538dbb5c9e902acce7c38b
SHA1 ad7ca4536e959e1d0ce84c339e34de61be987882
SHA256 ab49b745a52307675fe8cfbaf6451866e0f27eacccbb3013399f1e3294115ccd
CRC32 DB6ECA41
ssdeep 48:bbllck+itY5vm7I6Wzv9UAOb57C1cSMIg6lc3d+0UWHdVG/jJtFo3/d7T+:/llcHitlIxv9vk7C1+I4wWHLihk/x6
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis