Dropped Files | ZeroBOX
Name 41e3f69ecc09290e_httperrorpagesscripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\httpErrorPagesScripts[1]
Size 5.4KB
Processes 2084 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 1d8e5fd3c1fd384c_bullet[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\bullet[1]
Size 447.0B
Processes 2084 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 26f971d87ca00e23bd2d064524aef838
SHA1 7440beff2f4f8fabc9315608a13bf26cabad27d9
SHA256 1d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d
CRC32 614F6AFF
ssdeep 12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 0e5063b461d1b55e_{f4a94df6-3267-11ef-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F4A94DF6-3267-11EF-91C7-080027C2F7B0}.dat
Size 13.0KB
Processes 1712 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 64e77fc0a2c0f74baec8615264670e05
SHA1 3481b5521a3e00bdec8df5532b00b08c2b313a7b
SHA256 0e5063b461d1b55e1ac8158ffd4b187e9afc738a6d271eee95e8490dfb298578
CRC32 43BFCC6A
ssdeep 192:UeBb262Gb218QSb2183AWIb218QBb218Qfb218Qpb218Q78Q:UeB5Y2YRWIY1YbY9Y/
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 18ae9d76727c45a5_errorpagestrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\errorPageStrings[1]
Size 2.0KB
Processes 2084 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 867666e4f73a755e0c135ce4e90de230
SHA1 a7b1d23f1d2ef9de6b149925147d44076e17fcb3
SHA256 18ae9d76727c45a577073bfc8d8914fedccfcf43b5afeeaf26737448712334e3
CRC32 D8C63FA6
ssdeep 48:z9UUiqu6xl8W22751dwvRHERyRyntQRXP6KtU5SwVze/6e/+Ng7FU50U5ZF0:z9UUiqRxqH211CvRHERyRyntQRXP6C8o
Yara None matched
VirusTotal Search for analysis
Name 988cc4b451673f84_http_404[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\http_404[1]
Size 6.3KB
Processes 2084 (iexplore.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5 4cd84a1b063bf6dea53e06755ef9e24d
SHA1 9078ca0033b7be694b6af747cccc6b703cc84c29
SHA256 988cc4b451673f847d823c9d9ba14ad50d3ca1141bc1e17c6415b8f64b6e1c22
CRC32 761694B1
ssdeep 48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwySpdW:uKp6yN9JaKktZX36a7x05hwW71M
Yara None matched
VirusTotal Search for analysis
Name 92c9c8c23fa90683_recoverystore.{f4a94df5-3267-11ef-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F4A94DF5-3267-11EF-91C7-080027C2F7B0}.dat
Size 4.5KB
Processes 1712 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 c7a2321c676cb9c95a05b4b55c5b3a0c
SHA1 903ec6a909902a7e479c1104ba3a5c3fd39edbcf
SHA256 92c9c8c23fa90683fdcd5b4ee11a33084efa8e3a513ccd5eee93c1ec88ba8844
CRC32 8CB25246
ssdeep 12:rlfF2Z1OrEg5+IaCrI0F7+F2QrEg5+IaCrI0F7ugQNlTqbaxwONlTqbaxw:rqZ1O5/1Q5/3QNlWuNlW
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 8d018639281b33da_errorpagetemplate[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\ErrorPageTemplate[2]
Size 2.1KB
Processes 2084 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1 f4eda06901edb98633a686b11d02f4925f827bf0
SHA256 8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
CRC32 E6FF242A
ssdeep 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
Yara None matched
VirusTotal Search for analysis
Name 39e7de847c9f731e_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\down[1]
Size 748.0B
Processes 2084 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit colormap, non-interlaced
MD5 c4f558c4c8b56858f15c09037cd6625a
SHA1 ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA256 39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
CRC32 B475DDD7
ssdeep 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\background_gradient[1]
Size 453.0B
Processes 2084 (iexplore.exe)
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 51129c6c98a82ea4_info_48[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\info_48[1]
Size 4.0KB
Processes 2084 (iexplore.exe)
Type PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
MD5 5565250fcc163aa3a79f0b746416ce69
SHA1 b97cc66471fcdee07d0ee36c7fb03f342c231f8f
SHA256 51129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859
CRC32 C6BA4B0B
ssdeep 96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis