Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{400a0528-b25c-47e7-95f8-0a4f4b650779}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{400A0528-B25C-47E7-95F8-0A4F4B650779}.tmp
Size 1.0KB
Processes 2540 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 24e409d5ca9025f7_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2540 (WINWORD.EXE)
Type data
MD5 3567348ce9f71b72dfbe39184b5529e7
SHA1 c8e4ac97782b0aa1a2d5e9b494198e6599d7d681
SHA256 24e409d5ca9025f75bd5c2ea8a213614b1af5fee1051d6a2743d6583de13ba7f
CRC32 76AD0C2B
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItkBk1ulU5llFBjt:y1lWnlxK7ghqIk1uOhFF
Yara None matched
VirusTotal Search for analysis
Name 39340efd56f09946_~$19_7169909343268.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$19_7169909343268.doc
Size 162.0B
Processes 2540 (WINWORD.EXE)
Type data
MD5 fbaff6537725a456cfd18e027e4b2d40
SHA1 687d2b93fd0d998c157a75e39ffc3c199601e90b
SHA256 39340efd56f09946643970bcc58c7d02283de550ff2b6636535c1df0a37c171d
CRC32 543CD102
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt8llGlU5llFBjt:y1lWnlxK7ghq8uOhFF
Yara None matched
VirusTotal Search for analysis
Name a1fa622b47a529e1_b664a91b.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B664A91B.emf
Size 4.9KB
Processes 2540 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 bf2393dfe4576945d1f26d3595c5ef9f
SHA1 f9abbbcf4bad106e4f5c039082257357f4c28aef
SHA256 a1fa622b47a529e1064458aa0decd0c1ebc16efb621511c8cba545036ffeb00e
CRC32 71C49B27
ssdeep 24:Y6cOaHN87k0sqFjsdB3g6G7OdE5qOppcWfswKnZFwG6uvX51m0KZdHk1a/Uo:XQNikssdBg6qjpLkwOEG6kpnydHk1a/Z
Yara None matched
VirusTotal Search for analysis