Dropped Files | ZeroBOX
Name 32937e85b785a656_~wrd0001.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0001.doc
Size 2.7MB
Processes 1440 (WINWORD.EXE)
Type data
MD5 47f503cc44455890cdbc6fbda7773867
SHA1 01e8b32980f6456f0fec80e93861244deb42aabc
SHA256 32937e85b785a656edc7da1e4884d2d60c3f1f4236d2ab9d8a04fe7350930b34
CRC32 19272BD9
ssdeep 49152:GQsguf0j8nK6dxi/UN9MOCv4L9Jw6hOtF:9sgucInK0xScthOz
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{1e25ce05-fdc3-4850-b445-398cbae93af8}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1E25CE05-FDC3-4850-B445-398CBAE93AF8}.tmp
Size 1.0KB
Processes 1440 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name b071aa7b9c3384a1_~$lv.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$lv.exe
Size 162.0B
Processes 1440 (WINWORD.EXE)
Type data
MD5 6a289294198852679e7219dd7cea7f01
SHA1 6f662b4dadd1029a3fe68f901f118847cfd195e3
SHA256 b071aa7b9c3384a137f6c7142173f0c4326465a7f030f8cd716658eb39c526fb
CRC32 E16C56EF
ssdeep 3:yW2lWRdtzttiloW6L7mlvjTK7hTxpgHIt6txtdE8tl:y1lWgloWmqdK764648tl
Yara None matched
VirusTotal Search for analysis
Name b36d8460b0fb44df_~wrs{4a67094f-5a07-4b26-ab2f-f0cf3043557b}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4A67094F-5A07-4B26-AB2F-F0CF3043557B}.tmp
Size 1.5KB
Processes 1440 (WINWORD.EXE)
Type data
MD5 3aa298426224556b88ce323a7d85e3d8
SHA1 2a6663719852953235a1176fc5ea68b206122a00
SHA256 b36d8460b0fb44df78c98ba5327991840b7e08de53c7328909b6c9a87d6fc4d6
CRC32 F7BB394E
ssdeep 6:IiiiiiiiiiI4/9+Qc8++lPkalT4Mu8lPloBl/0j:W49+QG+3/3
Yara None matched
VirusTotal Search for analysis
Name 66b7d691f89dafcb_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1440 (WINWORD.EXE)
Type data
MD5 209bc8828e0aa2c7e3ac836a8ccb72f6
SHA1 29426685eccddb4daad055a2fbcb4e45a519372b
SHA256 66b7d691f89dafcb952d1627133b1eb82ab8a50ab70dcd03c202681fbe0e7943
CRC32 CB3E320F
ssdeep 3:yW2lWRdtzttiloW6L7mlvjTK7hTxpgHIt6txtdEmRhltn:y1lWgloWmqdK76464mFt
Yara None matched
VirusTotal Search for analysis
Name ebd75684e1557ba4_~wrd0000.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0000.doc
Size 2.7MB
Processes 1440 (WINWORD.EXE)
Type data
MD5 52f88bbab09a4c5aecaba02c2fa601f1
SHA1 7936c4b3bbabfd305a27cd361c5ed271d1653fdc
SHA256 ebd75684e1557ba4aff2f50a5eaa27dd837b0156d23431c00e01cefe6601fe16
CRC32 234382C3
ssdeep 49152:GQsguf0j8nK6dxi/UN9MOCv4L9Jw6hOtA:9sgucInK0xScthOe
Yara None matched
VirusTotal Search for analysis