Dropped Files | ZeroBOX
Name 3c451cdd7c9a4ee1_~$estions.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$estions.doc
Size 162.0B
Processes 3048 (WINWORD.EXE)
Type data
MD5 ae235a80e78c95d14f949551ed234e62
SHA1 c17d1105573ac57f74415dfc6407b4180b7c3aa5
SHA256 3c451cdd7c9a4ee1354c40be940c8f5ba27b488f9b755de4039c8cd6c7acb122
CRC32 56265CF0
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVt/m/l/4Xhn:y1lWnlxK7ghqqF/m/t4xn
Yara None matched
VirusTotal Search for analysis
Name 7d04f7431bbfa41a_mini.vbs
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Templates\mini.vbs
Size 13.0B
Processes 3048 (WINWORD.EXE)
Type ASCII text, with no line terminators
MD5 1e6cd917ed71a1241e4bedc29264bd98
SHA1 5b65037351caeb0e5a48d963d7ffa88d0271d546
SHA256 7d04f7431bbfa41a04bcc7e6b98b9de0d919756c4c671c5785c99fff45f16402
CRC32 5C0E5492
ssdeep 3:Obn:Obn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{6d661f2a-17d1-4ed3-96d6-7b8afea29c06}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6D661F2A-17D1-4ED3-96D6-7B8AFEA29C06}.tmp
Size 1.0KB
Processes 3048 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 066266c6b90d0c0e_~wrs{a16f5725-c313-47d4-a834-793a60c50d98}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A16F5725-C313-47D4-A834-793A60C50D98}.tmp
Size 12.0KB
Processes 3048 (WINWORD.EXE)
Type data
MD5 a4955c0d571800acb47485006e27a024
SHA1 e70f4cc2fe38b6dd696c53603461bb64af931627
SHA256 066266c6b90d0c0e7b143b1d019593be174f9ec0bdf951542d1d5f043b5778b5
CRC32 FEA303DA
ssdeep 192:QWr2imfBMlGUdQkza3WVsO67nORWr+BMlGUdQkza3WVsO67PxC:nr2XBMlGA1217pr+BMlGA1217U
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3048 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis