Dropped Files | ZeroBOX
Name dbd35a450b347d53_recoverystore.{84233efd-35df-11ef-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{84233EFD-35DF-11EF-91C7-080027C2F7B0}.dat
Size 4.5KB
Processes 2060 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 8853ccb38ccc4af9e74b4f9fde52ee2c
SHA1 bab4e1f00b58b2ba796a75079dee17c6d5dac44f
SHA256 dbd35a450b347d5306b79940ff10ae2738537d6e2fd1c57b68bccfb3732b4bef
CRC32 09C0B4A7
ssdeep 12:rlfF22orEg5+IaCrI0F7+F2YWrEg5+IaCrI0F7ugQNlTqbaxxFiNlTqbaxxFe6:rq2o5/1P5/3QNlWvNlW
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 9fb476d7edc84474_wmhe80fc.txt
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Cookies\WMHE80FC.txt
Size 130.0B
Processes 2136 (iexplore.exe)
Type ASCII text
MD5 0fdfcdb0f906b4487396e2deaf605c95
SHA1 ca01c5756d219d70f67130158958ae1d478bfab5
SHA256 9fb476d7edc8447465cf5b573232b0f174b4964b78eb26f187e8e370595406aa
CRC32 6F2F7B20
ssdeep 3:LDM8vU5uKOAcSbxT/BH68wooEveWJ3uJcSMM0bVjfvSYONaBv:Lg+MVNo8wAew+SVFbVLKYONaZ
Yara None matched
VirusTotal Search for analysis
Name 6822c359a9ba141a_accounts_google_com[1].htm
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\accounts_google_com[1].htm
Size 349.0B
Processes 2136 (iexplore.exe)
Type gzip compressed data, last modified: Fri Jan 19 20:33:04 1996, from TOPS/20
MD5 0e775393b26c3d7e6758cb51f5aaccb2
SHA1 aa2305e9f474c7c274feb9c9029fe14d1f242770
SHA256 6822c359a9ba141aa466b234889449223a168a1ae5ccd559e070b10d80fe6f62
CRC32 8BC7085D
ssdeep 6:XtZTC/VGTGTGTG8pZF0oTUIBi8X4U4ZGQsPHmQjQi02tsibb8klBdCYQwEn:XDGizF0OHChZGHPGZX2tsibb1un
Yara None matched
VirusTotal Search for analysis
Name 6de598428c334097_IE9CompatViewList[1].xml
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\IE9CompatViewList[1].xml
Size 141.7KB
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 c236e316e1b9ac60ce15dac7bcb8b2de
SHA1 1e240ed5f7cbc3dc8cd2397c7151a0d7e5f173c2
SHA256 6de598428c334097a21eb2dd5963c190fc5f80a6289bce205ded0466393745a4
CRC32 8B345ADA
ssdeep 3072:toSMrEDL1FwhdFFaz6l8vHG+TbFPAzepobjyG7I1K1IB2+Tir8v1IG9aIedyPcFC:mSMrEDL1FwhdFFaz6l8vHG+TbFPAzepR
Yara None matched
VirusTotal Search for analysis
Name 5e2d78995691d28b_{84233efe-35df-11ef-91c7-080027c2f7b0}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{84233EFE-35DF-11EF-91C7-080027C2F7B0}.dat
Size 9.5KB
Processes 2060 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 0302b6a7038e4606d3d52e1e0439411a
SHA1 ffeb65116bb6da8e1cd3a549d8a56d6d84267a19
SHA256 5e2d78995691d28be1a5a09a7c54b26d1d748b00c38861bf64257fffb2d04a04
CRC32 29AE4DFA
ssdeep 192:x3Hot8Ud3I8eG3HXot8j3Hot893Hot8r3Hot8b0fs3Hot8X:M8U+8ef8q8A8S8i8
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis