Dropped Files | ZeroBOX
Name 70f316a5492848bb_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\down[1]
Size 3.3KB
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 555e83ce7f5d280d7454af334571fb25
SHA1 47f78f68d72e3d9041acc9107a6b0d665f408385
SHA256 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
CRC32 9EA3279D
ssdeep 96:/SDZ/I09Da01l+gmkyTt6Hk8nTjTnJw1Ne:/SDS0tKg9E05TPoNe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 1cb3b6ea56c5b5de_bullet[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\bullet[1]
Size 3.1KB
Processes 2988 (xy_cjz_37658_315d8b4zbmga.exe)
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 0c4c086dd852704e8eeb8ff83e3b73d1
SHA1 56bac3d2c88a83628134b36322e37deb6b00b1a1
SHA256 1cb3b6ea56c5b5decf5e1d487ad51dbb2f62e6a6c78f23c1c81fda1b64f8db16
CRC32 51CC83D9
ssdeep 48:VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD2X+r0svw:VZ/I09Da01l+gmkyTt6Hk8nT2X+r0kw
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 0ba139ec5ddd7499_dnserrordiagoff_weboc[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\dnserrordiagoff_webOC[1]
Size 6.8KB
Processes 2988 (xy_cjz_37658_315d8b4zbmga.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 adcc2d1e30207729a7cafbfb292fcf38
SHA1 cf006d5d35c4e83d188a9409027e530c49f0e1f9
SHA256 0ba139ec5ddd749932736b17b776c710b5fe6562caeddce8ad476550e2404173
CRC32 77B9095D
ssdeep 48:uqUP2jV4V/NXvLdVAQnD5CMsLKiN1a5TIuINm3WoB32U00v32F/KRuc1kp9cDJK8:uAAtHAs1/LJIK71x00vS/pWN2K8bM
Yara None matched
VirusTotal Search for analysis
Name afce792469d28568_ErrorPageTemplate[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\ErrorPageTemplate[2]
Size 2.2KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name caa140523ba00994_info_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\info_48[1]
Size 6.8KB
Processes 2988 (xy_cjz_37658_315d8b4zbmga.exe)
Type PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
MD5 49e0ef03e74704089a60c437085db89e
SHA1 c2e7ab3ce114465ea7060f2ef738afcb3341a384
SHA256 caa140523ba00994536b33618654e379216261babaae726164a0f74157bb11ff
CRC32 4C99540A
ssdeep 192:NS0tKg9E05THXQJBCnFux5TsRfb+Y0ObhD9Uc7:LXE05UBCFAORfK9S7b7
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 003d30e7d128c677_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\errorPageStrings[1]
Size 2.5KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name 2595d37af443903c_XY裁决者-卸载.lnk
Submit file
Size 1.6KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Wed Jun 9 04:17:02 2021, mtime=Wed Jun 9 04:17:02 2021, atime=Thu Aug 6 20:04:04 2020, length=3066632, window=hide
MD5 006be677d86e09bb935b3b1696c772ad
SHA1 89617882bdad35c727e213cd2e2d24148e481f16
SHA256 2595d37af443903cddf5ad66609b7da3c4222a9f18a8393cebbeb749b5dfb70f
CRC32 F02B1B39
ssdeep 24:8Rhm+uMO6lt0MOZMOJg3lN50MO/EBkG0MOM:8RtllBvn1ZBf
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 2b6c6cea29f79a88_XY裁决者.lnk
Submit file
Size 761.0B
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Jun 9 04:17:02 2021, mtime=Wed Jun 9 04:17:02 2021, atime=Thu Aug 6 20:04:04 2020, length=3066632, window=hide
MD5 4afddc3cece572d6690ceb006279c661
SHA1 effa2df8749b8edb2d185c695cfd9672fd3785d1
SHA256 2b6c6cea29f79a889c42565c7914c8566e6ceebf0a3ebcb956360be24769252d
CRC32 DE953247
ssdeep 12:8mwNJsXAtYg+m9KF6MOizblkkmoxF6MOizRkmoxF6MOizdkmwggYh:8mwAm+uMO6lt0MOl0MOJtm
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\background_gradient[1]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis