Dropped Files | ZeroBOX
Name e3b0c44298fc1c14_cer6CAD.tmp
Empty file or file not found
Filepath C:\Windows\cer6CAD.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 3875b29a51c43728_~wrs{1ac6d599-968f-416b-a6e2-3dbeaec1a801}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1AC6D599-968F-416B-A6E2-3DBEAEC1A801}.tmp
Size 1.5KB
Processes 2216 (WINWORD.EXE)
Type data
MD5 d3ffe2a0edc9809738ab45c40ea9414e
SHA1 2e32c024bb8eef51d8af5bd5e9ff8646deb4baf7
SHA256 3875b29a51c43728202431c7c1331dd0bb4279bb1ac040d33d72ebf3e7112f46
CRC32 C240BBEB
ssdeep 6:IiiiiiiiiiE/bYflo3dc8++ZYSySkssqA1+tKHz:S/XtG+aSpk1j1+tKHz
Yara None matched
VirusTotal Search for analysis
Name 7fe72972370342f3_~wrs{988da255-5ba8-41a5-98df-e74db9e8aa71}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{988DA255-5BA8-41A5-98DF-E74DB9E8AA71}.tmp
Size 1.1KB
Processes 2216 (WINWORD.EXE)
Type data
MD5 be3c9d7d1157c4ee6e5960f8c3fd2588
SHA1 1c4568f683f9d48e08d5ea64084ebd7e679bb976
SHA256 7fe72972370342f3174128fb1731aff81ed2f3381aa13e6caaa831751a9955dd
CRC32 1AF77CA1
ssdeep 12:CPm2nFVUdsla0HXW9UdsJ1UGXW9UdsJ5MXch4hll:CPm2Yl0YpPYKBl
Yara None matched
VirusTotal Search for analysis
Name 5c206b4dc2d3a252_drivergfx.tmp
Submit file
Filepath C:\Drivers\DriverGFX.tmp
Size 129.5KB
Processes 2316 (DriverUpdateFx.exe)
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 1417f890248f193bb241f6b458ae4a97
SHA1 b2dfcbd8c3966ebed9275db7b14e359412db9963
SHA256 5c206b4dc2d3a25205176da9a1129c9f814c030a7bac245e3aaf7dd5d3ca4fbe
CRC32 1FDF991B
ssdeep 3072:lSAQPGJU7xU3+FKMI3iUbhO3CVs4jNnOvh7JWn:CPGJU7xU3+F/UROSVNYW
Yara
  • IsPE64 - (no description)
  • IsDLL - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name abfa11e29d06fd3a_~$einmetall job requirements.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$einmetall job requirements.doc
Size 162.0B
Processes 2216 (WINWORD.EXE)
Type data
MD5 d2068a8886406cde151d578549eff92f
SHA1 53dbaa9fb27e174023e56da1a91ed7dcd8aa7b9c
SHA256 abfa11e29d06fd3a4bbfba29b0873a435f5b548a733e3fcc53c1823c180917f7
CRC32 8A7A7466
ssdeep 3:yW2lWRdvL7YMlbK7lZunNWVlnDvtl:y1lWnlxK73hlnD
Yara None matched
VirusTotal Search for analysis
Name 8f20bd7ac51caeca_DriverCPHS.tmp
Submit file
Filepath C:\Drivers\DriverCPHS.tmp
Size 178.1KB
Processes 3028 (cmd.exe) 2296 (cmd.exe)
Type ASCII text, with CRLF line terminators
MD5 4d8ea25779a892048e02c716c8742758
SHA1 12ff47a0d2c60535ec77ff08222cae1064ac4c7d
SHA256 8f20bd7ac51caeca497981db33a9a660616f7358af4fdbd132a7e6f6349d5567
CRC32 002402E5
ssdeep 3072:W5mO14xcmUPR826PuhNH1kCAiibS3GcA1+tORecwwtL6IDHox:W571mFUPL1LGeWcAUMRecwwgIDHox
Yara None matched
VirusTotal Search for analysis
Name ca62d5e073f52f3c_DriverGFE.tmp
Submit file
Filepath c:\Drivers\DriverGFE.tmp
Size 2.0B
Type ASCII text, with no line terminators
MD5 271ddf829afeece44d8732757fba1a66
SHA1 56ab49a5c68f11cc45c651da6a3f339eff2853f8
SHA256 ca62d5e073f52f3ceb83f72d4d70d4fcd8b1ed041cddfb02ccfbbe1f90134f05
CRC32 1D067E6E
ssdeep 3:1:1
Yara None matched
VirusTotal Search for analysis
Name b063ee39c58d0421_DriverGFXCoin.tmp
Submit file
Filepath c:\Drivers\DriverGFXCoin.tmp
Size 178.1KB
Type ASCII text, with CRLF line terminators
MD5 76e0da32c9363d0df0614641dcfe555c
SHA1 96056fde433b03372e5dd75d5cd1eafbe54a8174
SHA256 b063ee39c58d04210dddcdf4824f4658a5d47181ddaef01f5a3c82c89d2ce849
CRC32 EE11B6DE
ssdeep 3072:Y5mO14xcmUPR826PuhNH1kCAiibS3GcA1+tORecwwtL6IDHox:Y571mFUPL1LGeWcAUMRecwwgIDHox
Yara None matched
VirusTotal Search for analysis
Name 818ac9d3621dd802_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2216 (WINWORD.EXE)
Type data
MD5 ee32490f318ff4e444547a5f83870e80
SHA1 09f2ae32c5f293e2ad8ab9eef34b353b0f27362c
SHA256 818ac9d3621dd80293562e5769e503579c6e9fe996e67c6145f7984c532d2f9b
CRC32 1A78502A
ssdeep 3:yW2lWRdvL7YMlbK7lznXl:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 589229e2bd931000_DriverUpdateFx.exe
Submit file
Filepath C:\Drivers\DriverUpdateFx.exe
Size 869.0KB
Processes 2932 (cmd.exe) 2296 (cmd.exe)
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 7b973145f7e1b59330ca4dd1f86b3d55
SHA1 10ce9174bff4856083e6adad0094a798ced2c079
SHA256 589229e2bd93100049909edf9825dce24ff963a0c465d969027db34e2eb878b4
CRC32 6F3940A1
ssdeep 24576:gLByfEWXrGU3Vrzll/POE7gLtk+oOg3uOvb725m:gV+iU3j7chk+w39z79
Yara
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{49f0111d-868e-4fa0-b0e0-7477ab9be03f}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{49F0111D-868E-4FA0-B0E0-7477AB9BE03F}.tmp
Size 1.0KB
Processes 2216 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis