Dropped Files | ZeroBOX
Name 41e3f69ecc09290e_httperrorpagesscripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\httpErrorPagesScripts[1]
Size 5.4KB
Processes 2080 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 5a83eacb277055f9_53repadmin[2].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\53repadmin[2].htm
Size 2.1KB
Processes 2080 (iexplore.exe)
Type HTML document, ISO-8859 text, with very long lines, with CRLF line terminators
MD5 ee8ae4ab167c63dd6d171d38d0efe587
SHA1 76517780ae565a77b247884a14989ce5fa2034d3
SHA256 5a83eacb277055f9adbe7ef8ea56f4bc436b16271e007251065b3d3743874fb6
CRC32 E9D370C0
ssdeep 48:w2WueOnnLXitOnnLXiROnnLXi3bmnX46knnmAwh+6ep+6eRBZHB+QklPSVzH/KSK:w27SwSUS3bmXRRAwh+1p+1RBb+QsP6E
Yara None matched
VirusTotal Search for analysis
Name a34825c99b35e542_common[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\common[1].js
Size 1.4KB
Processes 2080 (iexplore.exe)
Type HTML document, ASCII text, with very long lines, with CRLF line terminators
MD5 177a40b591222caec4524c31f2ac4512
SHA1 de0e9162e7aa9680f4b55a4ac4c81f67b5610b4a
SHA256 a34825c99b35e542a59c6a26c1bd7fcc760ca5837ce0f8f93a2b76a8ee0287df
CRC32 3FAA0BCC
ssdeep 24:Jf+CuUcu/5enptfoIiREK+4MhMxT7712aj8ilWiujyNjuqRWw:V+1UlKiWZjNilWUpuqww
Yara None matched
VirusTotal Search for analysis
Name e1941652405d4cf9_recoverystore.{bc9ccccb-ba49-11ed-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BC9CCCCB-BA49-11ED-91C7-080027C2F7B0}.dat
Size 4.5KB
Processes 1960 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 2d9473665fe033c6dc9e01593b08961a
SHA1 9e4c6cadbcbe0cf1c2d17eb3b243650a884f4223
SHA256 e1941652405d4cf9ac6da4906ab080237e1fb5dea312ee1a0bcbdb8386812a65
CRC32 0B0242CD
ssdeep 12:rlfF2cacarEg5+IaCrI0F7+F2vPrEg5+IaCrI0F7ugQNlTqbaxXNlTqbax:rq15/1vP5/3QNlWeNlW
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 1d8e5fd3c1fd384c_bullet[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\bullet[1]
Size 447.0B
Processes 2080 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 26f971d87ca00e23bd2d064524aef838
SHA1 7440beff2f4f8fabc9315608a13bf26cabad27d9
SHA256 1d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d
CRC32 614F6AFF
ssdeep 12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 6c3c1986f231973a_noconnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\noConnect[1]
Size 5.3KB
Processes 2080 (iexplore.exe)
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 7686f6957ab9b36be2ebba88772a1541
SHA1 27089f8c09e41fdc4c994f8a5a5b115058479def
SHA256 6c3c1986f231973a68ddbacfd2a40408c8766bb18851c1a80e121f08f9bcf4de
CRC32 CA869C92
ssdeep 96:x4xOKDm0AK8naEFgkQgWmwep7eyaHNdj1BQp3VaYuV5pLeOMnCi:x4xOuuK8nNFgyW3eJe9HzjfQpI5p7md
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name da15c9c13e83b458_{bc9ccccc-ba49-11ed-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BC9CCCCC-BA49-11ED-91C7-080027C2F7B0}.dat
Size 3.5KB
Processes 1960 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 f64f81836d007777d9e75f29efeb0c4e
SHA1 08f272f8d4d483a3cc1679746b075271cb3e269a
SHA256 da15c9c13e83b4582c31ec1d7dcf91f01cb38b514ea84b3da8e1299f338cd927
CRC32 772D6663
ssdeep 12:rl0oXGFa+xrEgmfx06F4rEgmf50qTNlI89baxZ+dS:rT+xG8G5NlRZdS
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name ffec98c94b7d45a0_t48uk51o.txt
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Cookies\T48UK51O.txt
Size 116.0B
Processes 2080 (iexplore.exe)
Type ASCII text
MD5 95b429844371810386698ed2197cddac
SHA1 557157f2ca91ee17a87089a3280ae3c7176f6bb9
SHA256 ffec98c94b7d45a0ad67ed16a68d548029c446b1df966f33d0ca0ac4aff802eb
CRC32 F087F816
ssdeep 3:lBic9mmBnRdQcS8UOOJXRlS/JUQc/9ZGcPZ5FPvn:lBi63BnU8UJJuRUQc/Xn
Yara None matched
VirusTotal Search for analysis
Name 10fe1d7788d9a779_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\dnserror[1]
Size 5.8KB
Processes 2080 (iexplore.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 67bbf4af23868b17115e91fc0f35b5d9
SHA1 f43e2691fa1d733fdfc6dc7c280a659af3bc8dc2
SHA256 10fe1d7788d9a779bcaaeb53f879c6254425e4b64a84b24bbbc099cd7be99058
CRC32 099D8EAD
ssdeep 48:uqUPsV4VWBXvXS4nZ1a5TI7HW/Tu21kpd87KZA9f+upbthDb6Xuzut7Cih0:uOpiEQKHT272axfnRzkh0
Yara None matched
VirusTotal Search for analysis
Name 6d2825ef6cb1ec28_hm[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\hm[1].js
Size 29.1KB
Processes 2080 (iexplore.exe)
Type ASCII text, with very long lines
MD5 2a17c3a777e636458578463800cf13b8
SHA1 94c2faf19f4a85fdbff1ea9f2eb695c0fc55bcb4
SHA256 6d2825ef6cb1ec28e26e289f94020868a96a70637e73a92037e52a2ab1dc5ba4
CRC32 DEDE26B4
ssdeep 768:dEI3qYG5gMdvusiPIx8SRwvuIXeWo03ov:dBG5gMdvusULvuIO03ov
Yara None matched
VirusTotal Search for analysis
Name bee0439fcf31de76_navcancl[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\navcancl[1]
Size 2.6KB
Processes 2080 (iexplore.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 4bcfe9f8db04948cddb5e31fe6a7f984
SHA1 42464c70fc16f3f361c2419751acd57d51613cdf
SHA256 bee0439fcf31de76d6e2d7fd377a24a34ac8763d5bf4114da5e1663009e24228
CRC32 912EA90C
ssdeep 24:r3avxU5hzsIVmVMeLmVMyHf63lboxMCLxvriN6LOAPAnQay78eLx5Tb87nVkEhML:upU0GVeLVGBXvrp4n/1a5TI7Ve/G79KX
Yara None matched
VirusTotal Search for analysis
Name 911a3756f45adce8_k44kfu4r.txt
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Cookies\K44KFU4R.txt
Size 94.0B
Processes 2080 (iexplore.exe)
Type ASCII text
MD5 432999f68deb33c87e9e0f8f0917203d
SHA1 b5ee3d8e061f5f651f91e16d2e0fd438d04cdba5
SHA256 911a3756f45adce8754226a11b247b9a6be90261800ce7e508336fd6460d0ef1
CRC32 CA339031
ssdeep 3:+mL1if9QoUVv7YfWAUsTOXGT/TiXdzFPvn:ZrovWA3sEbi7n
Yara None matched
VirusTotal Search for analysis
Name 18ae9d76727c45a5_errorpagestrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\errorPageStrings[1]
Size 2.0KB
Processes 2080 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 867666e4f73a755e0c135ce4e90de230
SHA1 a7b1d23f1d2ef9de6b149925147d44076e17fcb3
SHA256 18ae9d76727c45a577073bfc8d8914fedccfcf43b5afeeaf26737448712334e3
CRC32 D8C63FA6
ssdeep 48:z9UUiqu6xl8W22751dwvRHERyRyntQRXP6KtU5SwVze/6e/+Ng7FU50U5ZF0:z9UUiqRxqH211CvRHERyRyntQRXP6C8o
Yara None matched
VirusTotal Search for analysis
Name 207c4fdc88653f55_www.wenolira[1].xml
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\DOMStore\1XU2ZD41\www.wenolira[1].xml
Size 137.0B
Processes 2080 (iexplore.exe)
Type ASCII text, with no line terminators
MD5 a23d6f84e9e539dc54a4740392fba179
SHA1 3579364e5dedbb53ce0555200823d28bdbc482fc
SHA256 207c4fdc88653f555ba5f832fb92b87a063b04ecf674632df0d7d1bac9afd8fc
CRC32 9BBE9828
ssdeep 3:D9yRtFwslBic9mmBnRdQcHpgVqUrRxDSSc5Ul5uUlNROqTV5tFKRKb:JUFJBi63BnU2pqqKDSSaUl51NBb
Yara None matched
VirusTotal Search for analysis
Name 8d018639281b33da_errorpagetemplate[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\ErrorPageTemplate[2]
Size 2.1KB
Processes 2080 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1 f4eda06901edb98633a686b11d02f4925f827bf0
SHA256 8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
CRC32 E6FF242A
ssdeep 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
Yara None matched
VirusTotal Search for analysis
Name 39e7de847c9f731e_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\down[1]
Size 748.0B
Processes 2080 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 c4f558c4c8b56858f15c09037cd6625a
SHA1 ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA256 39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
CRC32 B475DDD7
ssdeep 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 2e7cbb274b70aa6f_favcenter[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favcenter[2]
Size 687.0B
Processes 2080 (iexplore.exe)
Type PNG image data, 16 x 16, 8-bit colormap, non-interlaced
MD5 79afa8ab0ff40639c6fb752e88e60ee1
SHA1 c940d08bfeb8a7012f9340c9c4821c8f59b7d38f
SHA256 2e7cbb274b70aa6f564088cb1b58029907b836e73119da8398687ae766b124c7
CRC32 55DFB61F
ssdeep 12:6v/7tWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW2cd//8NOR4JOzPi+oNoF2mcHhC2V:DWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWo
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient[1]
Size 453.0B
Processes 2080 (iexplore.exe)
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 5319babb8440f9c9_tj[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\tj[1].js
Size 258.0B
Processes 2080 (iexplore.exe)
Type ASCII text, with CRLF line terminators
MD5 976b938a1333eb8e3b6318d8b229c258
SHA1 0842af7e89ece6647bc14d9171cd7973dad06e33
SHA256 5319babb8440f9c9e6f622c64109a6c60fe45eab13f3fa3055f8729e8d14fcca
CRC32 C16CF9B5
ssdeep 6:qoRFokyJ8mgO9lVhntBCYdoiYi63BnU23L7JbDRWPWG3+Y29kJONe:hTyiuHnjCiorFBn5JDRWZ/29kJF
Yara None matched
VirusTotal Search for analysis
Name 51129c6c98a82ea4_info_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\info_48[1]
Size 4.0KB
Processes 2080 (iexplore.exe)
Type PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
MD5 5565250fcc163aa3a79f0b746416ce69
SHA1 b97cc66471fcdee07d0ee36c7fb03f342c231f8f
SHA256 51129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859
CRC32 C6BA4B0B
ssdeep 96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis