Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{428c0ee6-f1d4-4357-abd8-66be33795353}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{428C0EE6-F1D4-4357-ABD8-66BE33795353}.tmp
Size 1.0KB
Processes 5580 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 205bf14643fe9f3a_~$voice_115521.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$voice_115521.doc
Size 162.0B
Processes 5580 (WINWORD.EXE)
Type data
MD5 86c454d10931e448e39133a400f075c2
SHA1 e48c39829e91d62934c924292e0379567a0eba35
SHA256 205bf14643fe9f3aabead643bb8390cccbce0492e73b72702d6afece7b02b6f9
CRC32 B6422B1E
ssdeep 3:yW2lWRdvL7YMlbK7lCnDjtl:y1lWnlxK78nD
Yara None matched
VirusTotal Search for analysis
Name 001f49e3459d4f4e_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 5580 (WINWORD.EXE)
Type data
MD5 dfb15853cc1fc485e12f595243bdd05a
SHA1 6ce99814768cb93cb6e3ec63f5521195a2746c72
SHA256 001f49e3459d4f4e4015a6300c3093e513431642b66af28883ccb3a99298ec41
CRC32 4F19B374
ssdeep 3:yW2lWRdvL7YMlbK7lfnXl:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name df98c4734a9db9a4_~wrs{ded20aa7-fbb2-45cb-b98a-0cfa2459dbb1}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DED20AA7-FBB2-45CB-B98A-0CFA2459DBB1}.tmp
Size 15.0KB
Processes 5580 (WINWORD.EXE)
Type data
MD5 599d5dfaf3742ed536483db4452810ce
SHA1 cda09942392bf847cee782fa8a1be1d37483bc95
SHA256 df98c4734a9db9a44ca2e2d063b8bdc0651ee3dec5dc4be8fa1fe5690e74d9fc
CRC32 718DD6F4
ssdeep 384:YF8da4DzzZU8sPzjxhN7V9dL8U8V3bFy7XRWY23QgGoOrAQo6fr:wv4FU8snxHPR8VbaeHMho6T
Yara None matched
VirusTotal Search for analysis