Dropped Files | ZeroBOX
Name 39df3364a3af6f7d_z.zip
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\z.zip
Size 5.9KB
Processes 2312 (cscript.exe) 2208 (cmd.exe)
Type Zip archive data, at least v2.0 to extract
MD5 d2ea024b943caa1361833885b832d20b
SHA1 1e17c27a3260862645bdaff5cf82c44172d4df9a
SHA256 39df3364a3af6f7d360aa7e1345e27befc4be960e0e7e7e060b20f3389b80e76
CRC32 297F566C
ssdeep 96:cCfNDkKYP0EaCl4Nmw3oEpQGgRSYFJffDoWYISIwnCAeTghpGPFCmN:bfVkVCC0mw3pxgdrjpYISDKg+t
Yara None matched
VirusTotal Search for analysis
Name 0557ea4c5e309b16_x
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\x
Size 8.0KB
Type ASCII text, with CRLF line terminators
MD5 5ce1a2162bf5e16485f5e263b3cc5cf5
SHA1 e9ec3e06bef08fcf29be35c6a4b2217a8328133c
SHA256 0557ea4c5e309b16458ca32ac617b76d1a55f5f0103e368d05c0f0386b7a0a43
CRC32 AF771794
ssdeep 192:T4KX0Tg44AQsHkuxaWJOnJjWv07iVKmWynWmFr+E:BKu+xawOdFtmHWs
Yara None matched
VirusTotal Search for analysis
Name aa01b8864b43e920_x.js
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\x.js
Size 448.0B
Type ASCII text, with CRLF line terminators
MD5 8eec8704d2a7bc80b95b7460c06f4854
SHA1 1b34585c1fa7ec0bd0505478ac9dbb8b8d19f326
SHA256 aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596
CRC32 C7D4F068
ssdeep 12:KiN1ZxJbVCWiutHvBmjUXgYzxLElp3OxZIQv:JPxPCWDtPBmgX2ROxu6
Yara None matched
VirusTotal Search for analysis
Name 4bbf7589615ebdb6_memz.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\MEMZ.exe
Size 12.5KB
Processes 2312 (cscript.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9c642c5b111ee85a6bccffc7af896a51
SHA1 eca8571b994fd40e2018f48c214fab6472a98bab
SHA256 4bbf7589615ebdb6c769d6d2e7bdcb26072bac0cda6e225a4133ba8819e688d5
CRC32 A4C8CDE2
ssdeep 192:BCMfc/GinpRBueYDw4+kEeN4FRrfMFFp3+f2dvGhT59uay:AMfceinpOeRENYhfOj+eGdKa
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis