Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{3212a738-e20d-486f-900a-e8bca913ed0a}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3212A738-E20D-486F-900A-E8BCA913ED0A}.tmp
Size 1.0KB
Processes 1896 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 747ab12dee327314_~$19_7169909343268.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$19_7169909343268.doc
Size 162.0B
Processes 1896 (WINWORD.EXE)
Type data
MD5 8b3d0f3c136273abed848d02bcfa802d
SHA1 cfd25ff052bd064932f7634171f9512473e77d6c
SHA256 747ab12dee327314d171c52fae1ed16849e8d529466e579cbf85e0e5409a60ad
CRC32 D7888097
ssdeep 3:yW2lWRdEx1W6L7O2llLJK7MLlcIt4CgdmXn:y1lWS1WmCCldK7MRr4Cgk
Yara None matched
VirusTotal Search for analysis
Name 8b5a648751c67f22_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1896 (WINWORD.EXE)
Type data
MD5 ea217d550d9f0af47cb05b48501e07f4
SHA1 93d79e718ad78f0cf52298b24bd491ebee6f9e3d
SHA256 8b5a648751c67f22217bb91b4f6e60d995bbf4d8b0917b61819d7b1a61c7ce3c
CRC32 CDCF0B1B
ssdeep 3:yW2lWRdEx1W6L7O2llLJK7MLlcIt4Cgkl:y1lWS1WmCCldK7MRr4Cgs
Yara None matched
VirusTotal Search for analysis
Name a1fa622b47a529e1_2045f616.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2045F616.emf
Size 4.9KB
Processes 1896 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 bf2393dfe4576945d1f26d3595c5ef9f
SHA1 f9abbbcf4bad106e4f5c039082257357f4c28aef
SHA256 a1fa622b47a529e1064458aa0decd0c1ebc16efb621511c8cba545036ffeb00e
CRC32 71C49B27
ssdeep 24:Y6cOaHN87k0sqFjsdB3g6G7OdE5qOppcWfswKnZFwG6uvX51m0KZdHk1a/Uo:XQNikssdBg6qjpLkwOEG6kpnydHk1a/Z
Yara None matched
VirusTotal Search for analysis