Dropped Files | ZeroBOX
Name c95fc8fd8b6dc15c_nami.chm
Submit file
Filepath c:\program files (x86)\common files\tvjet\nami.chm
Size 224.0KB
Processes 2728 (tuc5.tmp)
Type MS Windows HtmlHelp Data
MD5 9d5d177a325e4936ae78a6105d5583a9
SHA1 5e55b378ab43435d2de81c45053618b76fd03c23
SHA256 c95fc8fd8b6dc15cd7487b10bd0f23e949857f87774feabcb47955da14e543bb
CRC32 50BB9338
ssdeep 6144:kF/XecRxTma6as9AcVF1ezAM5IKv1uaiLIbzh1foWJSZ1Y7iY4:2rH169HokKvlzh1fRgQeY4
Yara
  • chm_file_format - chm file format
VirusTotal Search for analysis
Name b9de38dcc42ba5d1_readme.txt
Submit file
Filepath c:\program files (x86)\common files\tvjet\readme.txt
Size 4.0KB
Processes 2728 (tuc5.tmp)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 5c192239d54e0e9d4fa75a3f1f84d25f
SHA1 416e9ed35cf0608a494e28c3f6093eafc99b5d2b
SHA256 b9de38dcc42ba5d18b5b1b7248438314c6c7221e22f2a61914f26c0aa9f79270
CRC32 05AF50D3
ssdeep 96:jfXPVF8oxhQOXN4WAw0tn00ontqxaVBoWx4JVNP:DX7VeUSv0qqx4nt
Yara None matched
VirusTotal Search for analysis
Name a4c86fc4836ac728__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-JLED4.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 2728 (tuc5.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 4ff75f505fddcc6a9ae62216446205d9
SHA1 efe32d504ce72f32e92dcf01aa2752b04d81a342
SHA256 a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
CRC32 B1C5F7C5
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name e19781aabe466dd8__isdecmp.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-JLED4.tmp\_isetup\_isdecmp.dll
Size 13.0KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a813d18268affd4763dde940246dc7e5
SHA1 c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256 e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
CRC32 03FC4C88
ssdeep 384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
VirusTotal Search for analysis
Name 4ebaa643bb403b73_vorbis1.dll
Submit file
Filepath C:\Program Files (x86)\Common Files\TVJet\vorbis1.dll
Size 711.5KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 188fc6a8cb8f16946ced03b3e9b3c8b2
SHA1 c07912804602402f006f137d1399c87386706dbf
SHA256 4ebaa643bb403b7313226fe978b0017c35403b6f57b201803fb05bd37d3d4fda
CRC32 4109C1D7
ssdeep 12288:+lJVU3Aen78H95Oz8Y1/xWgSAcQrRc7duWGOq:hTK95Ozt1/xWgSAcQrRcc8q
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
VirusTotal Search for analysis
Name c1c88fa977b9bb99_unins000.exe
Submit file
Filepath c:\program files (x86)\common files\tvjet\unins000.exe
Size 693.8KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 67825c80fc1a5ce1a8bd4cf3d2e949fc
SHA1 d458362283470596181bcf1f7599c1b9b1a2c5fe
SHA256 c1c88fa977b9bb99f023143f92c1703a5b6bddd5e692957e6e638b50dabcb43e
CRC32 BC912F1C
ssdeep 12288:C0QfKi+GlrPj37VzHEA6Yd2qKvJ4wyyrNQIRZCGkK3ch/bcXExy4z:yfKi+GlrPj37VzHEA6B3vDaCCGkJ/bck
Yara
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • UPX_Zero - UPX packed file
  • mzp_file_format - MZP(Delphi) file format
  • DllRegisterServer_Zero - execute regsvr32.exe
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name ff3644e04dbebaf0_vorbis1.dll
Submit file
Filepath c:\program files (x86)\common files\tvjet\vorbis1.dll
Size 752.5KB
Processes 2728 (tuc5.tmp)
Type PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
MD5 4d6d8d64f627853307f8e3fa7e6de73f
SHA1 168146ba18a9d9c3785570ff8616faf6758eb669
SHA256 ff3644e04dbebaf07049e1f25f6ff647ad1ff17715908cb840f3856c6e7e85ac
CRC32 AD73BA0D
ssdeep 12288:VHqnjkZLB2PLWN9tdN9td4sz8i8Xx0o4ecQiRcm+jrhYmo:hQjU2zhszD8Xx0o4ecQiRcxCn
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE64 - (no description)
VirusTotal Search for analysis
Name 4031a8feefd2fe5e_en.txt
Submit file
Filepath c:\program files (x86)\common files\tvjet\uitext\en.txt
Size 115.6KB
Processes 2728 (tuc5.tmp)
Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
MD5 52bc059b64807554fce950eaf03f6742
SHA1 6c46a83b65c3ef4e9a81c626f228ba90140caf7f
SHA256 4031a8feefd2fe5e862104839d15745c97f3fc2647bd98cbcae097713bc304ee
CRC32 43C6469D
ssdeep 3072:6Hr8qUQHcytOxDDYJUTHmwujqzuBo/UsOgTJiaR1KhYsYxo5nF:Fkjz
Yara None matched
VirusTotal Search for analysis
Name d762fabb3787fa50_volctl.exe
Submit file
Filepath c:\program files (x86)\common files\tvjet\volctl.exe
Size 19.0KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 35d76f1c3cd65111a119bc5c24170bea
SHA1 b0982219f443d2fc683d2ba8e9d3fc1f4822e180
SHA256 d762fabb3787fa50d14b38d0b259b667528e0bc6c443e1fd635e855ddefb71d3
CRC32 D7848887
ssdeep 192:1qpndA4hiPzNnKBg5CF919JKOMAzglXn/j9+TstD9DaKjTb5Ed5mV1YXjqrw:InW48niiOLzwP9Hb5uXSw
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name d9944b0e813903e3_ja.txt
Submit file
Filepath c:\program files (x86)\common files\tvjet\uitext\ja.txt
Size 48.0KB
Processes 2728 (tuc5.tmp)
Type Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
MD5 d27bb9ba4ad61e120e61df31a4c360a2
SHA1 7529afe6af17fb93397682e7da204aadcf23d37c
SHA256 d9944b0e813903e38ad965209a2421ef7699d803a052c6bb775c074546101151
CRC32 ACE47283
ssdeep 768:AHJYI/CFayRMn7v3UlM7QahzgMu5I/63JtYuu4RR9wGTUSkvl6JHFt:AHl6EyRMn7vDg/wSkvl6JHFt
Yara None matched
VirusTotal Search for analysis
Name 6b08a4921a930bff_nami.ini
Submit file
Filepath c:\program files (x86)\common files\tvjet\nami.ini
Size 289.0B
Processes 2728 (tuc5.tmp)
Type ASCII text, with CRLF line terminators
MD5 c94b4a9a92647df47962f849c42d91fb
SHA1 a3426e0123a8cd72469a50f0a55100bbe6ffc9dd
SHA256 6b08a4921a930bffbf0ea84d8d6f8257d7bd4d6948678e0a455c363dfbebbb16
CRC32 F6ECD582
ssdeep 6:Q2EaCY+7ov8+Q8vvDdXDKUzUeUHX2TYXTfrWfVvDVgyX6WFrDywMzVWVGyTxw:Q2Ef7ov8+bvrdTKMUeJGrWfgMrDywMzd
Yara None matched
VirusTotal Search for analysis
Name a0fa2342aa59edea_uninst.dll
Submit file
Filepath c:\program files (x86)\common files\tvjet\uninst.dll
Size 17.5KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 cfbc1a44bc45711196a601e6b3c09bbf
SHA1 aad59d1d94ca8c66f68ab627408546f17d4d530f
SHA256 a0fa2342aa59edea62bd0cdc69e494fd05606e96a20fc81b8cf8a746e27a4686
CRC32 DF9A4417
ssdeep 192:zxhXn4KXpbPo2PTgqIn+fwzNG5/B+ivpoJHUHTjY+6n+lep1yHrp6:zxh1gogqiKJmJ0Pgb1yHrg
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-JLED4.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
VirusTotal Search for analysis
Name c6d8ecfaf0c01713_nami.preset
Submit file
Filepath c:\program files (x86)\common files\tvjet\nami.preset
Size 2.7KB
Processes 2728 (tuc5.tmp)
Type data
MD5 bc32623591608995eaf61c5b8ec80044
SHA1 5000684cdaecb98fb6c2bf063b13aedfb8d7bc80
SHA256 c6d8ecfaf0c01713bf69ceb30f7e3c7e0ba1f09292884d10730c24e13c62b612
CRC32 7EA8FC2E
ssdeep 48:bHowSxUhZFccus+HR0sEQRy9iqn7FqiILYLeCqUiGiIQ+l7O/c:bSxUhZFcQ+Hkn5wLsexUi9IOU
Yara None matched
VirusTotal Search for analysis
Name fa70a865eb72e962_opus1.dll
Submit file
Filepath c:\program files (x86)\common files\tvjet\opus1.dll
Size 398.0KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 1b7fb1c58ee3b29763c9f0356a2f5dfc
SHA1 6de507d930eff045db4ebae68c1402059ea96105
SHA256 fa70a865eb72e962562e526a061797fdc184c0ba970d68d07e803b2d21911fc2
CRC32 1830B761
ssdeep 6144:wtwG6XFzskCGorvV5boeMWnkpmAoUpCfzGhTNN9SH8wUGDjIo287SmLo+rv:w+GizshE1WnMmAf8inXSCGDjIJGD
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name fc1dc1ce09b356fc_ogg.dll
Submit file
Filepath c:\program files (x86)\common files\tvjet\ogg.dll
Size 32.0KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 5f7beb4ce62e2499d2faad252c2fe1cb
SHA1 49eacd6a0fac00d82bd42d7a14888a95cc9bf766
SHA256 fc1dc1ce09b356fc7fa77ef9978749200d8013216fca1e84bb9862401f067d10
CRC32 49FAF7A7
ssdeep 384:lvhpYhHRBEHDtgzmqvHoShv4kNpPytl3R0LRRCppImMAYnQx9EgmQrs5rsFZyBl:l/IzmiThv1NpK7GtUplY+50OyBl
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
VirusTotal Search for analysis
Name a61f44fc0cde3b89_volctl.dll
Submit file
Filepath c:\program files (x86)\common files\tvjet\volctl.dll
Size 215.5KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 574be5cf3ebf3b225f410200d459003e
SHA1 ff2a3d6acac52fa7edb293bba308b521b15e3a5c
SHA256 a61f44fc0cde3b89d79b76ea2182fffca6a9585ee730aea6349c5a5407250a2d
CRC32 74FC1A0B
ssdeep 6144:r5YMPiTzaPjAjUoGjZ9cOU6UPdjHpJjP:OTziAtGkOSJ
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 2f6294f9aa09f59a__iscrypt.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-JLED4.tmp\_isetup\_iscrypt.dll
Size 2.5KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a69559718ab506675e907fe49deb71e9
SHA1 bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA256 2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
CRC32 FB05FA3A
ssdeep 24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
VirusTotal Search for analysis
Name bde9813cb5a87afa_unins000.dat
Submit file
Filepath C:\Program Files (x86)\Common Files\TVJet\unins000.dat
Size 5.1KB
Processes 2728 (tuc5.tmp)
Type data
MD5 57fbceb5ba454d981e168d7926067e8b
SHA1 5c5d5e1cf6dfd390845fc8271d24533f7af3ae7d
SHA256 bde9813cb5a87afad051ba827b53ba5927729d64c1387f523b92c2e43668d912
CRC32 E53AC54F
ssdeep 96:Lj+WGIpMNKA7xJOIhKj4cVSQs0LnKqU7CRLO4:3+WGIpcaIh7cVSQ1nKqU2l
Yara None matched
VirusTotal Search for analysis
Name fe6e5c7277afbf27_tvjet.exe
Submit file
Filepath c:\program files (x86)\common files\tvjet\tvjet.exe
Size 2.2MB
Processes 2728 (tuc5.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8d2e2242ecc00cebb833fd0057c87cf8
SHA1 5e6b95c8cd54c859c2cce94ee3899e9f470fc592
SHA256 fe6e5c7277afbf279c01b0dc64cb65ce2a15a586b3f1371753c2b9a6bc66a3f1
CRC32 0EE1504E
ssdeep 49152:xaHtaAWuacMjaAneaSDZU8aQahqa/oUDdg6pvAY3M7k0lrhvaMaZbi:sHYHhYyxKkrh95pvAYc7k0lrdZ
Yara
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name fcfdacedd3ebde5c_flac.dll
Submit file
Filepath c:\program files (x86)\common files\tvjet\flac.dll
Size 335.5KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 f3226e7f495c3bd8d93d71d970dd72fa
SHA1 51e831b81b8f71cf08b5008db5b645f750fb5f3a
SHA256 fcfdacedd3ebde5c29b8d86c8c9be3394e38ea523cd69885578463c49c319a52
CRC32 63DEB551
ssdeep 6144:3ok1DAtIiPvxFwgMHwMP/7lhYKHFYqYiA9XD5EhnFkQF6QUxAjuv2:3ok1APvAzltbYitFklQU8uv2
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 4dc09bac0613590f__regdll.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-JLED4.tmp\_isetup\_RegDLL.tmp
Size 4.0KB
Processes 2728 (tuc5.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0ee914c6f0bb93996c75941e1ad629c6
SHA1 12e2cb05506ee3e82046c41510f39a258a5e5549
SHA256 4dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2
CRC32 2748B2DA
ssdeep 48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • DllRegisterServer_Zero - execute regsvr32.exe
VirusTotal Search for analysis
Name d2218bde27d66f28_tuc5.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-DL1JH.tmp\tuc5.tmp
Size 683.5KB
Processes 2672 (tuc5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f507ce43ea08d1721816ad4b0e090f50
SHA1 e4f02bcd410bddabea4c741838d9a88386547629
SHA256 d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1
CRC32 5F289723
ssdeep 12288:q0QfKi+GlrPj37VzHEA6Yd2qKvJ4wyyrNQIRZCGkK3ch/bcXExy4:qfKi+GlrPj37VzHEA6B3vDaCCGkJ/bcQ
Yara
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • UPX_Zero - UPX packed file
  • mzp_file_format - MZP(Delphi) file format
  • DllRegisterServer_Zero - execute regsvr32.exe
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis