Dropped Files | ZeroBOX
Name 36180bb463bb03d3_recoverystore.{972056ed-1bc7-11f0-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{972056ED-1BC7-11F0-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2616 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 b57c8acfb114ead47e12dd9fe84db969
SHA1 48c98aa6be1e6c692cee3beae15fb161f9026d61
SHA256 36180bb463bb03d37c85e212dd1f05c61c383ad4256b55424f606fb0cdc2d93c
CRC32 EEC565FB
ssdeep 12:rlfF2srEg5+IaCrI0F7+F2AsrEg5+IaCrI0F7ugQNlTqbaxdNlTqbax2:rqs5/1As5/3QNlW4NlWl
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 80b702a8c7e1ffbd_avatar[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\avatar[1]
Size 16.5KB
Processes 2704 (iexplore.exe)
Type PNG image data, 145 x 145, 8-bit/color RGBA, non-interlaced
MD5 7d683f57befaf3d20cb422de0481e8be
SHA1 b3c8319409dd6a7f481f0e04600fc517549809be
SHA256 80b702a8c7e1ffbdee6775074104daa3a04e0dbd1cea7518629e49c7b19eac3f
CRC32 9FFD2B5A
ssdeep 384:FzUwx0zCmNbYsNOcJ9UrervZ/1+silLNCwuX6HTYWwkz:FzzrmNbYss69HrvZ/gVCPU0Bkz
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 7d8f6841c8c92d89_{972056ee-1bc7-11f0-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{972056EE-1BC7-11F0-948E-94DE278C3274}.dat
Size 7.0KB
Processes 2616 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 3f46e29a5ed7cb0ec385af4c190f494c
SHA1 f5a0b8b229ca5c74a66ee296d624f779b846daaf
SHA256 7d8f6841c8c92d890820f45ab608fec1ce73b549cf8d0cffff05f99167c49598
CRC32 648618EE
ssdeep 96:glsiNeR8Wu44aYDtYDF1Tu44aYDdONeXONepONe0p5eQwMH:gmiN+e4Wah1S4WQNrN9Nl
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name fd84f88b497040d4_fluhrq6tzzclqej-vdg-iuiadsna[1].woff
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\flUhRq6tzZclQEJ-Vdg-IuiaDsNa[1].woff
Size 161.0KB
Processes 2704 (iexplore.exe)
Type Web Open Font Format, TrueType, length 164912, version 1.1
MD5 3e1afe59fa075c9e04c436606b77f640
SHA1 e4bb7c1e40d3febee58df963db276b2bf68c117b
SHA256 fd84f88b497040d4f7d5e8c9f8635aef8d3e706c0fa52e2b6facf14eee87e522
CRC32 B0BE9D96
ssdeep 3072:9jUw8wUxYQjHKuw6dNYHVGeBMoJa0gPC2OHli9HsGrdty9TE4ZmAau/5ePy:JpUGGHKuw63A7E0g62MkmTRm9Jy
Yara None matched
VirusTotal Search for analysis
Name c705b5cbc744bbd4_gtm[1].js
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\gtm[1].js
Size 307.0KB
Processes 2704 (iexplore.exe)
Type ASCII text, with very long lines
MD5 135fef91b065e1ea9bb014da309fd7e8
SHA1 388b61682f0144edcca47fdc6e1e2f0dbd0a8134
SHA256 c705b5cbc744bbd4a0727761561c9c98e7d7c0adefb0f2a281084d6c44948503
CRC32 CEEBA432
ssdeep 3072:KH1MRZSRKOcchH0UGV1RWsYO/ci8Jk2c4SUW5BOTDuolwhcpTv9FmR/:4EKKvcsci8S1iTiolwhcpLmp
Yara None matched
VirusTotal Search for analysis