Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{9e4db667-f170-4564-9530-e13c254dd8c1}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9E4DB667-F170-4564-9530-E13C254DD8C1}.tmp
Size 1.0KB
Processes 2096 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name cc6214d67b6c9c45_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2096 (WINWORD.EXE)
Type data
MD5 57c528817382a3538ec35dd5cf4be558
SHA1 5d8a2dd5b3b1ffa58c0f40b541058090be2d3caa
SHA256 cc6214d67b6c9c45c54102a97e49bb4c067e3fea454996ec098795d59c825f02
CRC32 CC573495
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItO/OtjgWIart/:y1lWnlxK7ghqO2OWIet
Yara None matched
VirusTotal Search for analysis
Name 02f63241612c72f4_7a723fe3.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7A723FE3.emf
Size 4.9KB
Processes 2096 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 40dfb719a2ce11cb03e42955f7ae37fa
SHA1 0cce55ead0fb0716940834c461b3f5359ee113f1
SHA256 02f63241612c72f4fc3b503ba3ccd6bc11496bb77a5d1cb4885675c209a339b8
CRC32 41753EDD
ssdeep 24:Y6cOaHN5L0sqFjsdB3g6G7OdE5qOppcWfswKnZFwG6uvX5YXmkZdHkya/Uo:XQNpssdBg6qjpLkwOEG6kpYjdHkya/Z
Yara None matched
VirusTotal Search for analysis
Name c268adc11c7b46b1_~$29_966655534820.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$29_966655534820.doc
Size 162.0B
Processes 2096 (WINWORD.EXE)
Type data
MD5 4760f850cba00e16df57e2ea23f03b6b
SHA1 295b945dc997a131b116764c64e2c9237ed6ef89
SHA256 c268adc11c7b46b1b4c560ab6fb781b4fd683dfb150aa1f051873bbe7030cef4
CRC32 1697D759
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItMsqOtjgWIart/:y1lWnlxK7ghqMsqOOWIet
Yara None matched
VirusTotal Search for analysis