Dropped Files | ZeroBOX
Name 39e7de847c9f731e_down[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\down[2]
Size 748.0B
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 c4f558c4c8b56858f15c09037cd6625a
SHA1 ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA256 39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
CRC32 B475DDD7
ssdeep 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 9f8db31d4e0b23b8_{b0d9be3e-f37d-11ed-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B0D9BE3E-F37D-11ED-91C7-080027C2F7B0}.dat
Size 3.5KB
Processes 2704 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 b6ab7d40e83b24a006f27172042def62
SHA1 6c71fd24be82c06bc1b2a43d47cd08b5683d0c51
SHA256 9f8db31d4e0b23b86be9ffa9b887857297cc445e1882b49ca5f1fb8365b0210c
CRC32 751C611D
ssdeep 12:rl0oXGFmOxrEgmfB06FmdrEgmfB0qTNlz1baxAJtdw:rFOxG6dGxNlpxJfw
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 10fe1d7788d9a779_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\dnserror[1]
Size 5.8KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 67bbf4af23868b17115e91fc0f35b5d9
SHA1 f43e2691fa1d733fdfc6dc7c280a659af3bc8dc2
SHA256 10fe1d7788d9a779bcaaeb53f879c6254425e4b64a84b24bbbc099cd7be99058
CRC32 099D8EAD
ssdeep 48:uqUPsV4VWBXvXS4nZ1a5TI7HW/Tu21kpd87KZA9f+upbthDb6Xuzut7Cih0:uOpiEQKHT272axfnRzkh0
Yara None matched
VirusTotal Search for analysis
Name 2e7cbb274b70aa6f_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favcenter[1]
Size 687.0B
Type PNG image data, 16 x 16, 8-bit colormap, non-interlaced
MD5 79afa8ab0ff40639c6fb752e88e60ee1
SHA1 c940d08bfeb8a7012f9340c9c4821c8f59b7d38f
SHA256 2e7cbb274b70aa6f564088cb1b58029907b836e73119da8398687ae766b124c7
CRC32 55DFB61F
ssdeep 12:6v/7tWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW2cd//8NOR4JOzPi+oNoF2mcHhC2V:DWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWo
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 682b2209fc1f9e98_clnsetup (1).tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-TO192.tmp\clnsetup (1).tmp
Size 3.1MB
Processes 2448 (clnsetup (1).exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 773e0a76c252b71d5bfb4b219758fca3
SHA1 f7183ca519ee8ea15cc967b20d8b7461e26240a4
SHA256 682b2209fc1f9e9818be75e08073df08a3167aab596df0d201f0a7b4e596e213
CRC32 7CA1CB9E
ssdeep 49152:2WGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbQ333TY:6tLutqgwh4NYxtJpkxhGj333T
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • mzp_file_format - MZP(Delphi) file format
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 6c3c1986f231973a_noConnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\noConnect[1]
Size 5.3KB
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 7686f6957ab9b36be2ebba88772a1541
SHA1 27089f8c09e41fdc4c994f8a5a5b115058479def
SHA256 6c3c1986f231973a68ddbacfd2a40408c8766bb18851c1a80e121f08f9bcf4de
CRC32 CA869C92
ssdeep 96:x4xOKDm0AK8naEFgkQgWmwep7eyaHNdj1BQp3VaYuV5pLeOMnCi:x4xOuuK8nNFgyW3eJe9HzjfQpI5p7md
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 21b661caccbef5ff_tracker.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Tracker.bat
Size 112.0B
Processes 912 (setup.exe)
Type DOS batch file, ASCII text, with CRLF line terminators
MD5 b833c8b253fa8a50b2424da8a2ba79ee
SHA1 59b4d7be20237e0ed5d709d1d7315422f3472dd1
SHA256 21b661caccbef5ff876b578233e20f6f45473480a81ab77996d290c982fe3ceb
CRC32 1605212F
ssdeep 3:mKDDXg4VRSCCA1Gbg4VRDdAg7v+:hTg4V4CCAYg4VpWU+
Yara None matched
VirusTotal Search for analysis
Name 41ccff04438f2743_{b0d9be3c-f37d-11ed-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B0D9BE3C-F37D-11ED-91C7-080027C2F7B0}.dat
Size 3.5KB
Processes 2704 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 332be1f2bb255b89ef52a07d9578dc2c
SHA1 4420dd7a92778854aee9338574ea6014c5a19002
SHA256 41ccff04438f2743356319614a85a1a4796d66292a479d777ce196126485459d
CRC32 C146C2BC
ssdeep 12:rl0oXGFXxrEgmfB06FirEgmfB0qTNlz1baxADlb:r2xGmGxNlpx9
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 54e7e0ad32a22b77_idp.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-P41OL.tmp\idp.dll
Size 232.0KB
Processes 2568 (clnsetup (1).tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 55c310c0319260d798757557ab3bf636
SHA1 0892eb7ed31d8bb20a56c6835990749011a2d8de
SHA256 54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
CRC32 E86B363C
ssdeep 3072:dnSx3lws+iWbUmJmE8dxMw7r+mjT5PbzEFwyGIyTcHY10tSB9j:IP0bUmQEUr+mRcbTx4N
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\background_gradient[1]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name a1840b15c1cb1a7d_clnsetup (1).exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\clnsetup (1).exe
Size 1.7MB
Processes 912 (setup.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a5087cf0193854a455afcc4533fd7acf
SHA1 d5ef6a5455e43eb10642adef7e604de22e04ba08
SHA256 a1840b15c1cb1a7da67a23c2f83ec9a6378a91813fe9a95ec5c2304142f236d4
CRC32 C5EB1E22
ssdeep 24576:s7FUDowAyrTVE3U5F/v4qKh9Kic6QL3E2vVsjECUAQT45deRV9RE:sBuZrEUsf9KIy029s4C1eH9C
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • mzp_file_format - MZP(Delphi) file format
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 6de598428c334097_IE9CompatViewList[1].xml
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\IE9CompatViewList[1].xml
Size 141.7KB
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 c236e316e1b9ac60ce15dac7bcb8b2de
SHA1 1e240ed5f7cbc3dc8cd2397c7151a0d7e5f173c2
SHA256 6de598428c334097a21eb2dd5963c190fc5f80a6289bce205ded0466393745a4
CRC32 8B345ADA
ssdeep 3072:toSMrEDL1FwhdFFaz6l8vHG+TbFPAzepobjyG7I1K1IB2+Tir8v1IG9aIedyPcFC:mSMrEDL1FwhdFFaz6l8vHG+TbFPAzepR
Yara None matched
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name ed9179ce67d9ef5d_recoverystore.{b0d9be3b-f37d-11ed-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B0D9BE3B-F37D-11ED-91C7-080027C2F7B0}.dat
Size 5.5KB
Processes 2704 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 e47170a00ccf8fb9a6babc4279eee7f7
SHA1 af98e4551045f2acc4775ddd9651e3b0cbfa131c
SHA256 ed9179ce67d9ef5d4fcaaa784439c52a879cc37db849816c5f11485e7773fe86
CRC32 FA2B20E9
ssdeep 12:rl0YmGF2rEgmZ+IaCyZ7gSF2rrEgm8G+IaCrI0Zc8Oh9bVRsgG7751rG77INlTqN:rwG5/9rG8O/q8YaDNlW8bqwNlW8bsk
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 18ae9d76727c45a5_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\errorPageStrings[1]
Size 2.0KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 867666e4f73a755e0c135ce4e90de230
SHA1 a7b1d23f1d2ef9de6b149925147d44076e17fcb3
SHA256 18ae9d76727c45a577073bfc8d8914fedccfcf43b5afeeaf26737448712334e3
CRC32 D8C63FA6
ssdeep 48:z9UUiqu6xl8W22751dwvRHERyRyntQRXP6KtU5SwVze/6e/+Ng7FU50U5ZF0:z9UUiqRxqH211CvRHERyRyntQRXP6C8o
Yara None matched
VirusTotal Search for analysis
Name 388a796580234efc__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-P41OL.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 2568 (clnsetup (1).tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
CRC32 2CDCC338
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
Yara
  • UPX_Zero - UPX packed file
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 8d018639281b33da_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\ErrorPageTemplate[1]
Size 2.1KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1 f4eda06901edb98633a686b11d02f4925f827bf0
SHA256 8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
CRC32 E6FF242A
ssdeep 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
Yara None matched
VirusTotal Search for analysis