Dropped Files | ZeroBOX
Name 2a5291ffe538b8b1_{8bb45aa2-504a-11ee-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{8BB45AA2-504A-11EE-948E-94DE278C3274}.dat
Size 4.0KB
Processes 2616 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 1c8cf537a1d59d0d5309fa9b0604c1cf
SHA1 07683cbdc257fca7a9055bef827ca2850a441dbe
SHA256 2a5291ffe538b8b18394be2c985baccc444203b9989047ee4409a3dfe04f3a59
CRC32 B57E0A05
ssdeep 12:rl0YmGFGBrEgmfl7KFSrEgmfl7qgONls8Jbaxlan2KPQRyDNls8Jbaxlan2KPQRy:r4BGJGDONls40aWgDNls40aWg
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 7c0901cd74dfa766_recoverystore.{8bb45aa1-504a-11ee-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8BB45AA1-504A-11EE-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2616 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 dbdd3ff794baa75920b6ec60fb642062
SHA1 823ddcc078bfc5e80394da6341eb000a2078ac65
SHA256 7c0901cd74dfa766b3d70be0ea5443d264808178fe2970b8abd514b1dd1734c0
CRC32 14F3D4C7
ssdeep 12:rlfF2pCrEg5+IaCrI0F7+F26rEg5+IaCrI0F7ugQNlTqbaxWw926NlTqbaxWwsc9:rqk5/165/3QNlWLww6NlWLwsZM
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name de8b9f0ee1adde90_664379233-widgets[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\664379233-widgets[1].js
Size 156.4KB
Processes 2700 (iexplore.exe)
Type ASCII text, with very long lines
MD5 f0aa6e3ff6358593b2f954c198c91335
SHA1 c06a9d09a9b0bea57bf5a44d817a88701f3e7dd3
SHA256 de8b9f0ee1adde905d54057584b3fa9a20f84bbb494fc4296161947c7ae90c8b
CRC32 37EF16D2
ssdeep 1536:AhyIoWvOYbQ2kWa9MH8UwZdI3aC5/4M9f/unpKAanEzgN7D8BE8R13+SiVqOskwu:mda1IpXF/gKR7AHckAwiaqs+V
Yara None matched
VirusTotal Search for analysis
Name f3677d385b5d55bf_booking-comdetails_blogspot_com[1].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\booking-comdetails_blogspot_com[1].htm
Size 13.3MB
Processes 2700 (iexplore.exe)
Type HTML document, ASCII text, with very long lines
MD5 b31a65581c16d9ec7688fd612974a3b7
SHA1 bd4cf774890952c2de602359ec077b2657e35b24
SHA256 f3677d385b5d55bf53ceb4c6a60929338f34958fa8d11543ec045f1e68f5feac
CRC32 643C1AB5
ssdeep 768:babO7v3QmDk0Dll4A7+80kDXyC0vMqVE2leY:bai7v3QmN7+80kDXN0vMqV4Y
Yara
  • Javascript_Blob - use blob(Binary Large Objec) javascript
VirusTotal Search for analysis
Name 85acc4e61a3b481b_favicon[3].ico
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favicon[3].ico
Size 1.1KB
Processes 2700 (iexplore.exe)
Type MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
MD5 cb8b8274298ed2d49da1ab2d16b7675a
SHA1 12f3384b92ccf279be6cb24f5b75c60a2dacb5cb
SHA256 85acc4e61a3b481bad13e767dc90d3be5c1b00eb2638af2eaa08d010cec32b4f
CRC32 4F6117D3
ssdeep 12:blIa1a1aDo14lRSND/xxt7nHcfxnJDy6uZCZlstXEkl:beelRAzxbD8fy6uZvXEkl
Yara
  • icon_file_format - icon file format
VirusTotal Search for analysis
Name a9ca837900b6ae00_3566091532-css_bundle_v2[1].css
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\3566091532-css_bundle_v2[1].css
Size 35.1KB
Processes 2700 (iexplore.exe)
Type ASCII text, with very long lines
MD5 1e32420a7b6ddbdcb7def8b3141c4d1e
SHA1 a1be54d42ff1f95244c9653539f90318f5bc0580
SHA256 a9ca837900b6ae007386d400f659c233120b8af7d93407fd6475c9180d9e83d2
CRC32 F6BBF459
ssdeep 384:YN90OhFvg3A2VysImDyPWquJMpx/SCYW0h8+Rl9yaZwuJ86YKSQCNL/J69nKg93P:YN90Oh+JnIm6IvW0trVJw1gngRLFr2
Yara None matched
VirusTotal Search for analysis