Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{00bdd295-07ea-4b27-b934-2b6724c6f9a0}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{00BDD295-07EA-4B27-B934-2B6724C6F9A0}.tmp
Size 1.0KB
Processes 2400 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 9df227603ac9164e_~$29_9545200010193.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$29_9545200010193.doc
Size 162.0B
Processes 2400 (WINWORD.EXE)
Type data
MD5 bc3d286c0c914ed5f8cd4f63495b3b46
SHA1 9d70fe98376235f4be2e4e4113861196e02d2452
SHA256 9df227603ac9164e4776349b8f8752c5d61b594be48a033ab154c5c2625f0055
CRC32 968666BE
ssdeep 3:yW2lWRdEX/SyW6L7Xl/7lJK7+6KvMHIt1vFWhVtL:y1lWZyWmR/vK7+i4lADh
Yara None matched
VirusTotal Search for analysis
Name 02f63241612c72f4_30112b.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30112B.emf
Size 4.9KB
Processes 2400 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 40dfb719a2ce11cb03e42955f7ae37fa
SHA1 0cce55ead0fb0716940834c461b3f5359ee113f1
SHA256 02f63241612c72f4fc3b503ba3ccd6bc11496bb77a5d1cb4885675c209a339b8
CRC32 41753EDD
ssdeep 24:Y6cOaHN5L0sqFjsdB3g6G7OdE5qOppcWfswKnZFwG6uvX5YXmkZdHkya/Uo:XQNpssdBg6qjpLkwOEG6kpYjdHkya/Z
Yara None matched
VirusTotal Search for analysis
Name 1861e87085c270b3_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2400 (WINWORD.EXE)
Type data
MD5 10b1206ce26809a501da75693ab179f5
SHA1 96d79c2d3a848a75195f228401b0eea36d78fcc3
SHA256 1861e87085c270b31391990fc87bfee892b69c1f03055d4f4ca97058508a2345
CRC32 AE996E22
ssdeep 3:yW2lWRdEX/SyW6L7Xl/7lJK7+6KvMHIt1vFWh0//:y1lWZyWmR/vK7+i4lAS
Yara None matched
VirusTotal Search for analysis