Dropped Files | ZeroBOX
Name 41e3f69ecc09290e_httperrorpagesscripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\httpErrorPagesScripts[1]
Size 5.4KB
Processes 3068 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 1cb3b6ea56c5b5de_bullet[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\bullet[1]
Size 3.1KB
Processes 3068 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 0c4c086dd852704e8eeb8ff83e3b73d1
SHA1 56bac3d2c88a83628134b36322e37deb6b00b1a1
SHA256 1cb3b6ea56c5b5decf5e1d487ad51dbb2f62e6a6c78f23c1c81fda1b64f8db16
CRC32 51CC83D9
ssdeep 48:VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD2X+r0svw:VZ/I09Da01l+gmkyTt6Hk8nT2X+r0kw
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 16d3005d5d037a8d_unknownprotocol[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\unknownprotocol[1]
Size 6.8KB
Processes 3068 (iexplore.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 02d31f944c4c7cf6a60b5d31ebd3793f
SHA1 90a2c04f55df8ab1177c9ca11ffd4d0259c0d001
SHA256 16d3005d5d037a8d24b88a4dc7f532186336d8ce6399048408f41ae3a5cf0904
CRC32 7AB3A5D0
ssdeep 96:uzdYifFSOp6AE1/RgzIW/+fgtf0k36/hj7waw:uTcOpw1/ezf+fWW/N7wZ
Yara None matched
VirusTotal Search for analysis
Name caa140523ba00994_info_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\info_48[1]
Size 6.8KB
Processes 3068 (iexplore.exe)
Type PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
MD5 49e0ef03e74704089a60c437085db89e
SHA1 c2e7ab3ce114465ea7060f2ef738afcb3341a384
SHA256 caa140523ba00994536b33618654e379216261babaae726164a0f74157bb11ff
CRC32 4C99540A
ssdeep 192:NS0tKg9E05THXQJBCnFux5TsRfb+Y0ObhD9Uc7:LXE05UBCFAORfK9S7b7
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 0841b8072f09e4bb_{beee363d-0bce-11ec-9d79-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BEEE363D-0BCE-11EC-9D79-94DE278C3274}.dat
Size 8.0KB
Processes 2072 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 a36a3b14e857efe4a3b92c9872ce655e
SHA1 94a17711343ee871f445a13071036d7b91d53030
SHA256 0841b8072f09e4bbe6159fe926c82f386e00ac5297a648ad06d184a80ddea5d5
CRC32 3D54DED0
ssdeep 48:rrcGs0Gsn/pH+TkmuIwBNBbBotL6z+uTGuTQyvDv7IyvLdRJBNBbBotL6z+uTiuW:nYQxMUbNG9OmkLZHJbNG9OCkL6
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 003d30e7d128c677_errorpagestrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\errorPageStrings[1]
Size 2.5KB
Processes 3068 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name eba99598b71f7a47_{beee363a-0bce-11ec-9d79-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BEEE363A-0BCE-11EC-9D79-94DE278C3274}.dat
Size 4.0KB
Processes 2072 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 ce4d976edad92b00596464f0299e09e5
SHA1 bdc999537e026182b504bc3d0d81f075784f7745
SHA256 eba99598b71f7a47529f462132bb776f5f9db7e2148512d23fecbf966b094bd2
CRC32 7B46A73D
ssdeep 12:rl0YmGF+ovrEgmfN7KFmXrEgmfd7qgONlfxbaxN/Q13aNl089baxbsKtHaK+wA9:rAcGXXGbONlprwNl08Crlh+
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\background_gradient[1]
Size 453.0B
Processes 3068 (iexplore.exe)
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 95daa730bdb100f6_recoverystore.{beee3639-0bce-11ec-9d79-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BEEE3639-0BCE-11EC-9D79-94DE278C3274}.dat
Size 5.5KB
Processes 2072 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 9022de174e3acc9bf8f0d9099b28dc8a
SHA1 fd1005b84e91e283941785fcca7f14da296cf167
SHA256 95daa730bdb100f680fa76f6c25f3cee6b30dd5df61b589898d14bf8dd61336a
CRC32 19913F59
ssdeep 48:rvEWG54yWG59zPggo4ecppZggo4ecppa:tyZPpo4ecppZpo4ecppa
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 227fc6e5e5760823_{beee363c-0bce-11ec-9d79-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BEEE363C-0BCE-11EC-9D79-94DE278C3274}.dat
Size 4.0KB
Processes 2072 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 dfc6d9da29e186c8857911e24c35b69f
SHA1 984b52d11660025147babe44769f12a68b408623
SHA256 227fc6e5e57608230c5a68611500fb6dac3f28d5382c7ac7e0c5db5c458a5267
CRC32 83000546
ssdeep 12:rlxAFiZrEgm8GL76FRrEgm8GL7qjNlO+baxKVNlO+baxH:rhG8xG81Nlx7VNlxG
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name afce792469d28568_errorpagetemplate[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\ErrorPageTemplate[2]
Size 2.2KB
Processes 3068 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name 13400df74aacdc8e_cao6f4zm.htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\CAO6F4ZM.HTM
Size 987.0B
Processes 3068 (iexplore.exe)
Type HTML document, ASCII text, with CRLF, LF line terminators
MD5 90c6ff2f210098178feae1f6d2e5da6a
SHA1 7516afa746b1d7e4180528f573ae28a40431bbaf
SHA256 13400df74aacdc8e019357ee5c58d25cee6b66bed499053a86e672295b357a82
CRC32 6007EF54
ssdeep 24:kmczXjaQsEhOzfcyuFhsT639tGnOwm/hOzfcyn:COWhD1ttpwUha
Yara None matched
VirusTotal Search for analysis