Dropped Files | ZeroBOX
Name 6f44059f6696934a_~$mlcachecentos.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$MLCacheCentos.dOC
Size 162.0B
Processes 3040 (WINWORD.EXE)
Type data
MD5 9f1ae1b32058e0194f57dea1f65f6ebf
SHA1 842ed67225f6232208d7e93947c29daecdae3423
SHA256 6f44059f6696934a6f2b2642da36c1bc10590d7a656cfe63ea6dfecf8b9ea679
CRC32 942AC02B
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtvmlIXhn:y1lWnlxK7ghqqF+lIxn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{00c727d4-0030-4b2e-87bd-1b0d5637f8f4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{00C727D4-0030-4B2E-87BD-1B0D5637F8F4}.tmp
Size 1.0KB
Processes 3040 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3040 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis
Name 414489e878abe139_~wrs{df4246d2-a1de-4499-8921-8c8271026237}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DF4246D2-A1DE-4499-8921-8C8271026237}.tmp
Size 10.5KB
Processes 3040 (WINWORD.EXE)
Type data
MD5 77fa1ba7299ec2b286e0bab3e2566334
SHA1 ba370543029d9e90da55c56628126eeab57ee3af
SHA256 414489e878abe139d4373796add2ad15c90149fb28c8ba26cad408d10940a05f
CRC32 1B5FEE57
ssdeep 192:p2rtJjtPvN1eCfw/fQoJJiiR0OgkGuhhxQkr3V39K3MQLR8cjoNKFMRT:gfvHeC49aknXjl39JQV8cjoKO
Yara None matched
VirusTotal Search for analysis