Dropped Files | ZeroBOX
Name 41e3f69ecc09290e_httperrorpagesscripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\httpErrorPagesScripts[1]
Size 5.4KB
Processes 2700 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 70f316a5492848bb_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\down[1]
Size 3.3KB
Processes 2700 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 555e83ce7f5d280d7454af334571fb25
SHA1 47f78f68d72e3d9041acc9107a6b0d665f408385
SHA256 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
CRC32 9EA3279D
ssdeep 96:/SDZ/I09Da01l+gmkyTt6Hk8nTjTnJw1Ne:/SDS0tKg9E05TPoNe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 80b702a8c7e1ffbd_avatar[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\avatar[1]
Size 16.5KB
Processes 2700 (iexplore.exe)
Type PNG image data, 145 x 145, 8-bit/color RGBA, non-interlaced
MD5 7d683f57befaf3d20cb422de0481e8be
SHA1 b3c8319409dd6a7f481f0e04600fc517549809be
SHA256 80b702a8c7e1ffbdee6775074104daa3a04e0dbd1cea7518629e49c7b19eac3f
CRC32 9FFD2B5A
ssdeep 384:FzUwx0zCmNbYsNOcJ9UrervZ/1+silLNCwuX6HTYWwkz:FzzrmNbYss69HrvZ/gVCPU0Bkz
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name b5cb8b1ee9d7f5ae_{3abf99c8-1bc7-11f0-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{3ABF99C8-1BC7-11F0-948E-94DE278C3274}.dat
Size 10.5KB
Processes 2612 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 171e69e6f8edcab57f4cdb36c0a4bc0b
SHA1 2069a55e81c69b6f937ed6e431d1a73a0a81b9dd
SHA256 b5cb8b1ee9d7f5ae5ae91f76e3009bc9c6f7b55e29837dfcccb375062e793364
CRC32 531F6E4E
ssdeep 96:xo34DWAu4NdXu42qcCRwDdiHcR2rAV1UohAkyVtHyu:xo34DWl4j+42qczUohA9VtSu
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 1cb3b6ea56c5b5de_bullet[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\bullet[1]
Size 3.1KB
Processes 2700 (iexplore.exe)
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 0c4c086dd852704e8eeb8ff83e3b73d1
SHA1 56bac3d2c88a83628134b36322e37deb6b00b1a1
SHA256 1cb3b6ea56c5b5decf5e1d487ad51dbb2f62e6a6c78f23c1c81fda1b64f8db16
CRC32 51CC83D9
ssdeep 48:VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD2X+r0svw:VZ/I09Da01l+gmkyTt6Hk8nT2X+r0kw
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 003d30e7d128c677_errorpagestrings[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\errorPageStrings[2]
Size 2.5KB
Processes 2700 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name 6976c426e3ac66d6_noconnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\noConnect[1]
Size 8.0KB
Processes 2700 (iexplore.exe)
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 3cb8faccd5de434d415ab75c17e8fd86
SHA1 098b04b7237860874db38b22830387937aeb5073
SHA256 6976c426e3ac66d66303c114b22b2b41109a7de648ba55ffc3e5a53bd0db09e7
CRC32 F9D26F41
ssdeep 192:SSDS0tKg9E05TKPzo6BmMSpEJH8x07oLKsiF+2MxNdcNyVE:tJXE05g/uEJH8m7oLKLo2MxncUVE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name ed6e1010a1ade146_recoverystore.{3abf99c7-1bc7-11f0-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3ABF99C7-1BC7-11F0-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2612 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 4c1f4646f764a3918feec2a2ade0c2aa
SHA1 0a260ef5b9364405b644594ca20eb25189dd4396
SHA256 ed6e1010a1ade146105953209699a2593501c8b7c891208789c1fac1d96943f7
CRC32 430115FF
ssdeep 12:rlfF2cHrEg5+IaCrI0F7+F2pWrEg5+IaCrI0F7ugQNlTqbaxkdNNlTqbaxkNJ:rqcH5/1pW5/3QNlWxNNlWhJ
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name b2a7ebabda1f3b30_dark-default-peexe[1].png
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\dark-default-peexe[1].png
Size 2.3KB
Processes 2700 (iexplore.exe)
Type PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
MD5 a0428adfbef73e092677c575c218a2e1
SHA1 baf1e8ca694712cc8ac8cd8aa8992264cf372064
SHA256 b2a7ebabda1f3b307ada3b0e0d16f53196987e76f52b2d2bf4228e75b608d2d2
CRC32 5E872F89
ssdeep 48:D/6RKypGe3Bz8ZFNS9upb3pewhM0nsLYupmy4Wp1NtPzJaGYTVod:DSRKeLsN2ELpZhsLwyBphbJaj5u
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 07d07a467e4988d3_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\favcenter[1]
Size 3.3KB
Processes 2700 (iexplore.exe)
Type PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
MD5 25d76ee5fb5b890f2cc022d94a42fe19
SHA1 62c180ec01ff2c30396fb1601004123f56b10d2f
SHA256 07d07a467e4988d3c377acd6dc9e53abca6b64e8fbf70f6be19d795a1619289b
CRC32 7FE3FBCC
ssdeep 96:RZ/I09Da01l+gmkyTt6Hk8nT1ny5y3iw+BT:RS0tKg9E05T1yIyw6
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\background_gradient[1]
Size 453.0B
Processes 2700 (iexplore.exe)
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name afce792469d28568_errorpagetemplate[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\ErrorPageTemplate[2]
Size 2.2KB
Processes 2700 (iexplore.exe)
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name 3a2afe884e38a649_dnserrordiagoff[2]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\dnserrordiagoff[2]
Size 8.4KB
Processes 2700 (iexplore.exe)
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 979fb29fb0552819bc1a5495dac1319f
SHA1 ee81bb1787e8dfc299e2c1f83c9a53201d15c0a9
SHA256 3a2afe884e38a649cdc43ba0d1e3f79a5f6757830103bd205c917b0ef196206b
CRC32 B0DB141B
ssdeep 96:uHrpbAsQCKnx1x00vHyN/LaWN2P8bSF2OxrjSaFXQsgUkn:uLpdQPjyN/LLN2aSFBjSGXQVUkn
Yara None matched
VirusTotal Search for analysis