Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{d9318aaa-6904-44ea-8c85-942a2c05e1db}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D9318AAA-6904-44EA-8C85-942A2C05E1DB}.tmp
Size 1.0KB
Processes 3000 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 45701d2d9fc44be5_version.xml
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Office\version.xml
Size 223.0B
Processes 3000 (WINWORD.EXE)
Type ASCII text, with CRLF line terminators
MD5 f585dc303aad4de57575dc4382ba2827
SHA1 1bf72039e61dfc7bc585e61fac7bd23c6e9c2656
SHA256 45701d2d9fc44be557bfda499062255d899757f6c2958e671050e4bca149fa3a
CRC32 6BBC67DF
ssdeep 6:9cNAWdgUMu9K1tFsHsvKLrE6IgsGKyHGXgFF2VAATB:9vWdEyK1HsHjrE6IcX3ylTB
Yara None matched
VirusTotal Search for analysis
Name 053903d873e1ac89_~$cument.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$cument.doc
Size 162.0B
Processes 3000 (WINWORD.EXE)
Type data
MD5 0fb8744f5bfaa5563975c0e2db79ba47
SHA1 3ef4ec8fcd9de2b8d08026a2e0df0a733ee16ba1
SHA256 053903d873e1ac89ee0177b42390bbd0bf73f9ec3c32ed2d492274f24f3a91f8
CRC32 BAFCD5EA
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtKlwXhn:y1lWnlxK7ghqqF3xn
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3000 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis