Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{be4cdce8-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDCE8-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 840 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name a42a03c1b35b5433_~$ficialzx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$ficialzx.doc
Size 162.0B
Processes 840 (WINWORD.EXE)
Type data
MD5 fcd938e9c5a87a6d5514f23bc8bdc9ae
SHA1 08a96610b036fcbbbf74a5dca125e0d2d292db47
SHA256 a42a03c1b35b5433d29421ed68ddb930ef12e001bd8e3181399cb1c1e8f14840
CRC32 DEBFAB6D
ssdeep 3:yW2lWRdLXW6L7sZJK7PLtcItm/Th1Rl/:y1lWXWmAXK7xrm/xl/
Yara None matched
VirusTotal Search for analysis
Name 2963878b66e1fae2_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 840 (WINWORD.EXE)
Type data
MD5 2a199df916efcabeef070819874ade23
SHA1 6cd01a1be73cf0ffc0727309bbaecdcda2660201
SHA256 2963878b66e1fae20b8982274ea558bc4b3403878a6729b72606d0e439fbf7a5
CRC32 EDDCA1FA
ssdeep 3:yW2lWRdLXW6L7sZJK7PLtcItm/Th9ftn:y1lWXWmAXK7xrm/9
Yara None matched
VirusTotal Search for analysis
Name 1273f6bed5c83309_~wrs{c4e2f51f-da36-49fc-b9d5-108ccc5c54a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C4E2F51F-DA36-49FC-B9D5-108CCC5C54A4}.tmp
Size 42.5KB
Processes 840 (WINWORD.EXE)
Type data
MD5 52361d1e04d8b4da4d725bb78367b99d
SHA1 dbfa6c015e495c1711066bb8b792268c62f169a3
SHA256 1273f6bed5c8330987ffcd590ec4a84722d5251cea6c4cbcf75dc36f2d7f67ac
CRC32 B7C29EA0
ssdeep 768:ys0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsfhQ7uCBtXU9NgSzz:6DvwxKrK2fhcuCI9GS
Yara None matched
VirusTotal Search for analysis