Dropped Files | ZeroBOX
Name 09686ad84f331605_~wrs{c3743658-070a-41b9-aa73-924b961cfc78}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C3743658-070A-41B9-AA73-924B961CFC78}.tmp
Size 38.9KB
Processes 112 (WINWORD.EXE)
Type data
MD5 9c448e1926d7b4c095b26b1d9b5331f2
SHA1 8e974c01d7fc2e38d9156b658a1441449abab0af
SHA256 09686ad84f33160549e3f26a16e71eb9fffb2898a67bbb22ca647b3b2db3bb07
CRC32 30217C61
ssdeep 768:dUKAKQpWiYWX/pHVlEbaQ+GKIakG88K6sKR77DnzQYQSc+O1PQStBQe+TQdrZXgL:C
Yara None matched
VirusTotal Search for analysis
Name df6e8b833be42324_~$cree-08.03.2021.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$cree-08.03.2021.doc
Size 162.0B
Processes 112 (WINWORD.EXE)
Type data
MD5 168cc1463a1422bb203a90e42f5957b5
SHA1 9b4b36c13f9e50b9407f0d43548748804a2a87a8
SHA256 df6e8b833be42324ee2caf2f246f7a6a719e1048e2c1da1ea80f6ce50b5b275e
CRC32 5C9CF613
ssdeep 3:yW2lWRdvL7YMlbK7lZ1ngnlZFl:y1lWnlxK731nil
Yara None matched
VirusTotal Search for analysis
Name cdff3010a99ddf7e_compareforfor.jpg
Submit file
Filepath C:\Users\Public\compareForFor.jpg
Size 203.0B
Processes 2532 (mshta.exe)
Type HTML document, ASCII text
MD5 abf1d463408534fc4120d337f2cb8737
SHA1 2abf24160903a593a4e3e5788605cb223f43d5e3
SHA256 cdff3010a99ddf7e0a057def399befee8a584634a3bbe694fc4ad53eeea2df5a
CRC32 61988B97
ssdeep 6:pn0+Dy9xwGObRmEr6VnetdzRx3RHKCezocKqD:J0+oxBeRmR9etdzRxdez1T
Yara None matched
VirusTotal Search for analysis
Name fb38061bf601001c_compareforfor.hta
Submit file
Filepath C:\Users\Public\compareForFor.hta
Size 3.1KB
Processes 112 (WINWORD.EXE)
Type MIPSEL-BE MIPS-II ECOFF executable not stripped - version 118.32
MD5 193b84d45dd371c6e4a501333d37349b
SHA1 742ed8d0202aafba1c162537087a8a131cb85cde
SHA256 fb38061bf601001c45aafe8d0c5feaa22c607d2ff79cfb841788519ca55a17b4
CRC32 00CA4771
ssdeep 96:91tEO8d6Bs1vZv3dFALLLb5awFBrdfQYizGDHR:zte67rdfrieHR
Yara None matched
VirusTotal Search for analysis
Name 818ac9d3621dd802_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 112 (WINWORD.EXE)
Type data
MD5 ee32490f318ff4e444547a5f83870e80
SHA1 09f2ae32c5f293e2ad8ab9eef34b353b0f27362c
SHA256 818ac9d3621dd80293562e5769e503579c6e9fe996e67c6145f7984c532d2f9b
CRC32 1A78502A
ssdeep 3:yW2lWRdvL7YMlbK7lznXl:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{5f8b61f0-3c4f-4530-a0a2-26cab4cfd072}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5F8B61F0-3C4F-4530-A0A2-26CAB4CFD072}.tmp
Size 1.0KB
Processes 112 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis