Dropped Files | ZeroBOX
Name 0713bc279555767d_~$mliebrowserhistory.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$MLIEBrowserhistory.doc
Size 162.0B
Processes 1028 (WINWORD.EXE)
Type data
MD5 9439138639b07f93e46d593f409063d1
SHA1 6a781139b2b3cc2796fb82337fdafe03542c7eac
SHA256 0713bc279555767d190b1642bede8bfd323456522ec863413e99d6f7bef32b04
CRC32 A3C20175
ssdeep 3:yW2lWRdqBliyW6L7RBjlJK7QZBhgHIt/btttLrtl:y1lWEliyWmjXK7Q/hg4TttBZl
Yara None matched
VirusTotal Search for analysis
Name 8595632c6efa6bab_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1028 (WINWORD.EXE)
Type data
MD5 f762e0c3d28db88dec02d148bec54444
SHA1 3154eb1669b97e30d3072cc225111e72c0fdfeef
SHA256 8595632c6efa6babae285a2429b02b7239cd71e257b07d57e696f7a64fe5bbf7
CRC32 22D7A56C
ssdeep 3:yW2lWRdqBliyW6L7RBjlJK7QZBhgHIt/btttLtUQlt:y1lWEliyWmjXK7Q/hg4TttBmQlt
Yara None matched
VirusTotal Search for analysis
Name d090aefefd5af735_~wrs{21d5b489-a7e5-492f-a191-16bd82f34cf7}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{21D5B489-A7E5-492F-A191-16BD82F34CF7}.tmp
Size 8.3KB
Processes 1028 (WINWORD.EXE)
Type data
MD5 bd52ca91bc0d2356ba6c8abf6244a690
SHA1 7eb6b51b9d3b5905da92f53c6ffda7e9301fa164
SHA256 d090aefefd5af7359821b980790a5ef09a83bab372760be63a1b53efc665a146
CRC32 F9E1B8A4
ssdeep 192:E8AWC1AeO1ndMdtBgJnmkeCQN2qQ3bj2Fh/:9vkpWMdtYjQ0q6bCr/
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{31d35729-5cdc-4ae5-9630-1138e3515487}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31D35729-5CDC-4AE5-9630-1138E3515487}.tmp
Size 1.0KB
Processes 1028 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis