Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{366d0917-82e6-491d-8fa1-f8793586e913}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{366D0917-82E6-491D-8FA1-F8793586E913}.tmp
Size 1.0KB
Processes 2332 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 3b51a50959bc7b4a_~$4%90%e1%bb%81 c%c6%b0%c6%a1ng.docm
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$4%90%e1%bb%81 C%c6%b0%c6%a1ng.docm
Size 162.0B
Processes 2332 (WINWORD.EXE)
Type data
MD5 97604076ee87dd2542697b1a41e2c1bc
SHA1 c66af32f9bf63665a7070cb8705fedc05cee3146
SHA256 3b51a50959bc7b4afd8b1fbddc1eff30ce6e083ba7cc0356c43c2f13b22beb30
CRC32 E0B628A5
ssdeep 3:yW2lWRdvL7YMlbK7lZxnBMAl:y1lWnlxK73xn+A
Yara None matched
VirusTotal Search for analysis
Name 52daabeb35ba0789_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2332 (WINWORD.EXE)
Type data
MD5 f0737e8de4bb679b27fc1d36fcad0d2c
SHA1 777b2a49e05c0587a2253b874f65728c482fe2c6
SHA256 52daabeb35ba07892775bda32cf8c4aabee4bc0201a8489a744c5f5b94013ccf
CRC32 84EE95CF
ssdeep 3:yW2lWRdvL7YMlbK7lAll:y1lWnlxK7u
Yara None matched
VirusTotal Search for analysis