Dropped Files | ZeroBOX
Name 21d03f19c4b1c12d_red_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\red_shield[1]
Size 3.4KB
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 87de5d9a3403e1d7635885cbaa52389d
SHA1 50b32c5966331e3e27bef987fd1da0129423d348
SHA256 21d03f19c4b1c12db2feb8fb3a373d7e378976ecdfb64efb300204edc8947d3d
CRC32 15814E36
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTzVcxkZFd/:5SDS0tKg9E05TJcxi
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name d0ba19f5e334e60f_invalidcert[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\invalidcert[1]
Size 2.1KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 66f441cef8801549c2f0ff12cbe752a5
SHA1 de506bfb63225b3cc084ae292d4bf98a21ae6250
SHA256 d0ba19f5e334e60fb5056bc2e05b97de09aee4db49e5e11abde482bab9c4e8fb
CRC32 13C10CC2
ssdeep 48:mPntofz4/i5DjktylVDJlObUBsBXcysTqysg2Bp5Bi8OwaBynLysTqys4Bwy/Ae:SE4a5HlVDJMbUB2XcylyNkpfi8OwgynN
Yara None matched
VirusTotal Search for analysis
Name 70f316a5492848bb_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\down[1]
Size 3.3KB
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 555e83ce7f5d280d7454af334571fb25
SHA1 47f78f68d72e3d9041acc9107a6b0d665f408385
SHA256 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
CRC32 9EA3279D
ssdeep 96:/SDZ/I09Da01l+gmkyTt6Hk8nTjTnJw1Ne:/SDS0tKg9E05TPoNe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 2792 (PowerOff.exe) 744 (iexplore.exe)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name 557ccabb2f6f0a8c_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 252.0B
Processes 2792 (PowerOff.exe) 744 (iexplore.exe)
Type data
MD5 c938206213158c07e7dfcfa718c95238
SHA1 fcd97054ad8950114bca04e8f499c6376199494e
SHA256 557ccabb2f6f0a8c4f628c2ec3efcd99be3fb7c864b9506485a77102d9592180
CRC32 CA20DA14
ssdeep 3:kkFklrX/tfllXlE/VWw1BllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1ADEQcOP:kKzWA1liBAIdQZV7CDEQcK1
Yara None matched
VirusTotal Search for analysis
Name 6976c426e3ac66d6_noConnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\noConnect[1]
Size 8.0KB
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 3cb8faccd5de434d415ab75c17e8fd86
SHA1 098b04b7237860874db38b22830387937aeb5073
SHA256 6976c426e3ac66d66303c114b22b2b41109a7de648ba55ffc3e5a53bd0db09e7
CRC32 F9D26F41
ssdeep 192:SSDS0tKg9E05TKPzo6BmMSpEJH8x07oLKsiF+2MxNdcNyVE:tJXE05g/uEJH8m7oLKLo2MxncUVE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 9c0d294c05fc1d88_kenessey.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\70-d6d8b-65e-9938c-d92ff496b918b\Kenessey.txt
Size 9.0B
Processes 2792 (PowerOff.exe)
Type ASCII text, with no line terminators
MD5 97384261b8bbf966df16e5ad509922db
SHA1 2fc42d37fee2c81d767e09fb298b70c748940f86
SHA256 9c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
CRC32 AC75BF49
ssdeep 3:KWigXn:KWigXn
Yara None matched
VirusTotal Search for analysis
Name 5f96df0fb078c706_byqibuqyqa.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7c-440d3-728-fac9b-5a0261a9df152\Byqibuqyqa.exe
Size 586.5KB
Processes 2792 (PowerOff.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 436e921da691211e16a1adb9ff4d90cd
SHA1 6f64647c26bc9d98367618f185fbcfc7717d2851
SHA256 5f96df0fb078c706569a49150cf1674f2d6e94cefec73b39a19275ea9a3ac7c6
CRC32 4684D481
ssdeep 6144:jQ2ebsCMhaAZYMrNMQnJwRw6MLT4htWWS:jQ2jRzMQyRw6MLT4htWWS
Yara
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 972f06b59e99ceaa_{4dadf94c-6091-11ed-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{4DADF94C-6091-11ED-948E-94DE278C3274}.dat
Size 6.0KB
Processes 2996 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 4e52eedccc60b84c1ee7e1d9e7347345
SHA1 f12adcb5fd1299acd3fe3d1bc1b44090dd0d034f
SHA256 972f06b59e99ceaa2dfb6c33409f54e0d4c07d073d4c4956d2c1ab19947da690
CRC32 9771255B
ssdeep 48:riGdx+1MzzJaksgMzzmBLeaMzzuMzz2//r1MzzcgMzh:34kkkmmByTn23rky
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 8a94163256a722ef_shaedahaepahy.exe.config
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\70-d6d8b-65e-9938c-d92ff496b918b\SHaedahaepahy.exe.config
Size 1.2KB
Processes 2792 (PowerOff.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 98d2687aec923f98c37f7cda8de0eb19
SHA1 f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA256 8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
CRC32 2328D28C
ssdeep 24:2dZmht+SDfy4GOy4TO4q5X4tndGubyB8GRyF:ccdfy4G74TO4qN4hRN
Yara None matched
VirusTotal Search for analysis
Name 003d30e7d128c677_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\errorPageStrings[1]
Size 2.5KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name 469fdfcaca047a13_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\dnserror[1]
Size 6.1KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 8c98552955cbb31ebed64742bf23349a
SHA1 e1d12cf6c84e4dca1c69421209e12237633f8e75
SHA256 469fdfcaca047a13a75283d5fd4bb96b56a28666d9df02195fdc2a4b78250539
CRC32 1A5BE0FF
ssdeep 96:uATpCAEQIgGN2P8bWF2oxrjSaFXQsgUkn:ukp4QSN2aWFFjSGXQVUkn
Yara None matched
VirusTotal Search for analysis
Name c758c5d20536a022_{40d890d8-6091-11ed-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{40D890D8-6091-11ED-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2764 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 015791ccd2497e3b92b8f0b90927b3ec
SHA1 61b26324b9b59660837c07d1978fac571f5fae48
SHA256 c758c5d20536a022e45a6f0cfe017712188a9c949e00a20c24718a557fe1bef4
CRC32 770305E6
ssdeep 12:rl0ZGF2QrEgmf506FGDrEgmfh0qgNNlTVbaxLNlb9baxPyVY:rSQGeGmNNlp+NlZ+0
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name fc9fc7f487d65069_shaedahaepahy.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\70-d6d8b-65e-9938c-d92ff496b918b\SHaedahaepahy.exe
Size 367.0KB
Processes 2792 (PowerOff.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 6e4c946eceaf7b60c29fdf78df7befda
SHA1 2404136776099be1032cb9f4e901f783b1ea4e07
SHA256 fc9fc7f487d650690b734473eb2e45fea84b5e83227485122956b4f03750bb1e
CRC32 E94F600F
ssdeep 6144:nBXcUW2Fn9G6nY2So8zNIvBygmwWyqp5/yF3HKjWInIDAneZMUrLPaiaqJ9y7BYw:BcEG6nrvApwlk543HKjWInIDAneZMUr2
Yara
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 7f5bb560be06da49_recoverystore.{4dadf94b-6091-11ed-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4DADF94B-6091-11ED-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2996 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 bd69ed35e98b5742e7271a76287ac70c
SHA1 015532bb10f0b25ebed77a8406643e75260652d4
SHA256 7f5bb560be06da49117f79e1913f9a08da733a170e82429114d4abe91234bae3
CRC32 3F0C04B1
ssdeep 12:rlfF20rEg5+IaCrI0F7+F2NQrEg5+IaCrI0F7ugQNlTqbax2vgNlTqbax2v:rq05/1NQ5/3QNlWKNlW
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-2D1M1.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 2620 (Bolt.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name f2afc04a24c9d89d_red_shield_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\red_shield_48[1]
Size 6.8KB
Type PNG image data, 40 x 48, 8-bit/color RGBA, non-interlaced
MD5 f413dd8a75b81a154a1fd5e4c4a0a782
SHA1 667f7e3da51ca3417a1feb66d238466423c9487d
SHA256 f2afc04a24c9d89d3c2f0d73f8cd6fb6b65adbe333196c3f99cc7d6868847ceb
CRC32 D96BDACF
ssdeep 192:8SDS0tKg9E05Tz045xhOwZtbiFHsrC3rlTqpHbW:7JXE05d5xhOwtGsSTqpHC
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 203d7b61eac96de8_idp.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-2D1M1.tmp\idp.dll
Size 216.0KB
Processes 2620 (Bolt.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 8f995688085bced38ba7795f60a5e1d3
SHA1 5b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
CRC32 90D9CA64
ssdeep 3072:6XHWOJd5D0ocxYF0+CT4zNHNpwZNjlhBKL/kg/0r4YLuztNJaFlCx:6G6tae7wZNOpiWP
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 1d07cfb7104b85fc_Bolt.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-93H7L.tmp\Bolt.tmp
Size 694.5KB
Processes 2568 (Bolt.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ffcf263a020aa7794015af0edee5df0b
SHA1 bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA256 1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
CRC32 59A45BB2
ssdeep 12288:bQhCh1/aLmSKrPD37zzH2A6QGgx/bsQYq9KgERkVfzrrNVyblD4cNaf/yxyR:bQYh1yLmSKrPD37zzH2A6QD/IpqggE29
Yara
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name fbc23311fb5eb53c_background_gradient_red[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient_red[2]
Size 868.0B
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1x800, frames 3
MD5 337038e78cf3c521402fc7352bdd5ea6
SHA1 017eaf48983c31ae36b5de5de4db36bf953b3136
SHA256 fbc23311fb5eb53c73a7ca6bfc93e8fa3530b07100a128b4905f8fb7cb145b61
CRC32 C08DA614
ssdeep 24:vk9YMW80o0XxDuLHeOWXG4OZ7DAJuLHenX36n8R0O3kwd2q:M9YM3uERAq8uyJdB
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name c34233832ba58e65_kevideqoga.exe
Submit file
Filepath C:\Program Files (x86)\Windows Sidebar\Kevideqoga.exe
Size 126.0KB
Processes 2792 (PowerOff.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 70a9b681d28137cfb4f0b4ab59ef51c6
SHA1 91d2af3d463821562b8fe9be06d4b304ebc2585b
SHA256 c34233832ba58e65dfaf36d7be1c5395326a9f601e894c6615748ab5600e0220
CRC32 980E17C1
ssdeep 3072:8kIyEk+sfa7YyBJFYDmuStguz3j2qtB+KN+m1+zAqSoMY:8kIyxfaDJFYCuStgoiJ++m18AqDM
Yara
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 6d8dea8b5aa5f626_PowerOff.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-2D1M1.tmp\PowerOff.exe
Size 576.0KB
Processes 2620 (Bolt.tmp)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 95c22189a5542b6c49204118750be5d9
SHA1 2755e3389015061165040f2ed95d55f08df48b69
SHA256 6d8dea8b5aa5f626afdb80a2961dafa783f8346a943255e2ca020db3dd6566e1
CRC32 553AF3C7
ssdeep 12288:umhkoTCYXJa/OYl+WUKlhHKjcaxvWzmeVq3TPjuTW4N1:FJTCUJaN4qWo
Yara
  • IsPE32 - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name afce792469d28568_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\ErrorPageTemplate[1]
Size 2.2KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name 07d07a467e4988d3_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favcenter[1]
Size 3.3KB
Type PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
MD5 25d76ee5fb5b890f2cc022d94a42fe19
SHA1 62c180ec01ff2c30396fb1601004123f56b10d2f
SHA256 07d07a467e4988d3c377acd6dc9e53abca6b64e8fbf70f6be19d795a1619289b
CRC32 7FE3FBCC
ssdeep 96:RZ/I09Da01l+gmkyTt6Hk8nT1ny5y3iw+BT:RS0tKg9E05T1yIyw6
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\background_gradient[1]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name c686babc034f53a2_green_shield[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\green_shield[1]
Size 3.4KB
Type PNG image data, 14 x 16, 8-bit/color RGBA, non-interlaced
MD5 254d388ce19d84a54fd44571e049e6a6
SHA1 51ca725642f679978f5880278e5cac5ca4f70fae
SHA256 c686babc034f53a24a1206019e958ba8fc879216fd7b6a4b972f188535341227
CRC32 265B0B9C
ssdeep 96:5SDZ/I09Da01l+gmkyTt6Hk8nTkN9D6ZB+:5SDS0tKg9E05TkN92ZE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name c53dca3187e86798_recoverystore.{40d890d7-6091-11ed-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{40D890D7-6091-11ED-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2764 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 bdebc0a43ee5583e7e62a6ede681d803
SHA1 4cff48d9b133b4f8f49997787372dbf7e4087c9a
SHA256 c53dca3187e867986a3d90b23eb4d7970aea04d0451b789fe85d2a4da25c5d3d
CRC32 780CA7E6
ssdeep 12:rlfF2UirEg5+IaCrI0F7+F2ZzllQrEg5+IaCrI0F7ugQNlTqbaxjYIzNlTqbaxjD:rqUi5/1ZJlQ5/3QNlWPANlWV
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 388a796580234efc__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-2D1M1.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 2620 (Bolt.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
CRC32 2CDCC338
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name ba92995d1296b989_invalidcert[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\invalidcert[2]
Size 4.9KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 57868b56f2ae430d15693e82a827ddb5
SHA1 c72b54f285f93e0ada5d1991dd2e8d1a14aa6a0c
SHA256 ba92995d1296b989dc78b21e8c7eaadc799e91db819f3f83bfba817b28df6e4b
CRC32 6CA10D5C
ssdeep 96:UqUHCkAs5PFkiGjUpG9gHdk0iSAu5hfeGNBz1t9hS:9ULAsnkdjo2gnNBz39hS
Yara None matched
VirusTotal Search for analysis