Dropped Files | ZeroBOX
Name a3dcc30a9885c1b8_{3c3b8aff-434d-11ec-a8f0-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{3C3B8AFF-434D-11EC-A8F0-94DE278C3274}.dat
Size 4.0KB
Processes 1792 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 7fc8a8c39718868eb32c4ff221b80906
SHA1 2e0a002975ecd6dc0f520a9549e48a8b5bd65995
SHA256 a3dcc30a9885c1b8597e436065205aa1664a793fcd6c856ad55df60d5995dd5f
CRC32 288F1D27
ssdeep 12:rlR7FjrEgm8GL7KFjrEgm8Gz7qPNlCgbVNl26abax:rNG8zG8JNlLpNlI
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name fe1f6dbb4f5fa447_{35f2aa26-434d-11ec-a8f0-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{35F2AA26-434D-11EC-A8F0-94DE278C3274}.dat
Size 4.5KB
Processes 1792 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 988a32c73bd2fd70da375f3a5d782c65
SHA1 28ff9bedac071c4ec81d54c0e9e1525088353f97
SHA256 fe1f6dbb4f5fa447b36c029acc0eb21f5e8164fe284e085449704de641bd055e
CRC32 44A2F023
ssdeep 12:rl0ZGF6irEgmfAB76FqKrEgmfN7qgONl08hbaxl/Q1V3iLNl/9baxwKtHaK+w63i:rGiG/GLONl0Aj8NlF2lh+
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 7e88dc21fa32ca01_{35f2aa2a-434d-11ec-a8f0-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{35F2AA2A-434D-11EC-A8F0-94DE278C3274}.dat
Size 4.0KB
Processes 1792 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 999cbd019be2c0b1db498965a13f933b
SHA1 ec99db71f8d0ae0faa0c36c9cef6c690359c814b
SHA256 7e88dc21fa32ca0155249391440df9535fc9a0fcffef2bc7c2e08178f5b0500c
CRC32 585A4BFF
ssdeep 12:rlxAFbycrEgm8GL76ForEgm8GL7qjNlO+baxjNlO+baxG:rRcG8IG81NlxWNlxH
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name bc46a147eec9403b_{35f2aa28-434d-11ec-a8f0-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{35F2AA28-434D-11EC-A8F0-94DE278C3274}.dat
Size 4.0KB
Processes 1792 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 4b1c4f5de30610199b7385f4d7678d9e
SHA1 c8110a8fa80b392098d2b11965e3d9c819243fcf
SHA256 bc46a147eec9403be82ebfb124c3eeadce7c3323fbe8ab3d77e3174801b6205d
CRC32 D36B5295
ssdeep 12:rlxAFZ7rEgm8GL76F4LrEgm8GL7qjNlO+baxKVNlO+baxH:ruG8YLG81Nlx7VNlxG
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 1cb3b6ea56c5b5de_bullet[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\bullet[1]
Size 3.1KB
Processes 2252 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 0c4c086dd852704e8eeb8ff83e3b73d1
SHA1 56bac3d2c88a83628134b36322e37deb6b00b1a1
SHA256 1cb3b6ea56c5b5decf5e1d487ad51dbb2f62e6a6c78f23c1c81fda1b64f8db16
CRC32 51CC83D9
ssdeep 48:VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD2X+r0svw:VZ/I09Da01l+gmkyTt6Hk8nT2X+r0kw
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 89097f85954c992a_eywcet97lv2u[1].cab
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\EYWCET97LV2U[1].cab
Size 281.1KB
Processes 2252 (iexplore.exe)
Type Microsoft Cabinet archive data, 287893 bytes, 1 file
MD5 0785352502e5180153c079fa6cbe1ada
SHA1 94cabf17018ce27745e0effb5346c4b8afb71e69
SHA256 89097f85954c992ab27572d63daf119b87bb75cd3785ffcc2b5615988a9a398b
CRC32 391DA56E
ssdeep 6144:Ht289kjPMvG/Ob5606j6EJ7jnjF6LHaEaIskUTlje:N+jPMvr6+kjFqHaEdkl6
Yara
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httperrorpagesscripts[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\httpErrorPagesScripts[2]
Size 5.4KB
Processes 2252 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 16d3005d5d037a8d_unknownprotocol[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\unknownprotocol[1]
Size 6.8KB
Processes 2504 (iexplore.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 02d31f944c4c7cf6a60b5d31ebd3793f
SHA1 90a2c04f55df8ab1177c9ca11ffd4d0259c0d001
SHA256 16d3005d5d037a8d24b88a4dc7f532186336d8ce6399048408f41ae3a5cf0904
CRC32 7AB3A5D0
ssdeep 96:uzdYifFSOp6AE1/RgzIW/+fgtf0k36/hj7waw:uTcOpw1/ezf+fWW/N7wZ
Yara None matched
VirusTotal Search for analysis
Name caa140523ba00994_info_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\info_48[1]
Size 6.8KB
Processes 2252 (iexplore.exe)
Type PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
MD5 49e0ef03e74704089a60c437085db89e
SHA1 c2e7ab3ce114465ea7060f2ef738afcb3341a384
SHA256 caa140523ba00994536b33618654e379216261babaae726164a0f74157bb11ff
CRC32 4C99540A
ssdeep 192:NS0tKg9E05THXQJBCnFux5TsRfb+Y0ObhD9Uc7:LXE05UBCFAORfK9S7b7
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 022544f2319242fd_{35f2aa2b-434d-11ec-a8f0-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{35F2AA2B-434D-11EC-A8F0-94DE278C3274}.dat
Size 4.5KB
Processes 1792 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 5e73adfc5d99bb8ceac06e4b36ff5b41
SHA1 84ea53476de43c641e91ba2ffa484be7405fbaef
SHA256 022544f2319242fd58e2558f2b5f7664df7ef6b5e938444d479bffbfaa258f75
CRC32 93B5BFAB
ssdeep 48:rwxXpe+Tk3Gufpn+Tk3GuTrBNBbBotWz+:c8G8VGSbNGE
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 003d30e7d128c677_errorpagestrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\errorPageStrings[1]
Size 2.5KB
Processes 2504 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name afce792469d28568_errorpagetemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\ErrorPageTemplate[1]
Size 2.2KB
Processes 2504 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name 4cea5853f21e1a71_{35f2aa29-434d-11ec-a8f0-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{35F2AA29-434D-11EC-A8F0-94DE278C3274}.dat
Size 6.5KB
Processes 1792 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 08c5f4935a3f9327df4da7af36eb21a5
SHA1 237a8a8a9c7c6def78a41200a3ef07f3ef553562
SHA256 4cea5853f21e1a71b2bfc15394004405f64e9bd2706874c9a5e01688c9dfd96a
CRC32 2507242E
ssdeep 48:rpGsjfpH+Tk3GuTrBNBbBotWz+QEuTQyvDv7VvgyvLdTJBNBbBotWz+TTo:Xt1GSbNGEbEkLrFJbNGEr
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\background_gradient[1]
Size 453.0B
Processes 2252 (iexplore.exe)
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 27000aefc3bc1565_recoverystore.{35f2aa25-434d-11ec-a8f0-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{35F2AA25-434D-11EC-A8F0-94DE278C3274}.dat
Size 6.0KB
Processes 1792 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 4271da6f3006219746cf0f1989f5f9ba
SHA1 bcdaaf6449406886dc3ff9c544626cd1ba02ad84
SHA256 27000aefc3bc156526aca72e06fec2fe1bce9dc24f2b3af31cd5d4d3e491ab39
CRC32 5376626E
ssdeep 24:r7qbG5/V8OIcG5/V8ZHMsMCNlWwMUdNlWwUw0:rQG5tRIcG5twvewQw
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis