Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{be4cde46-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDE46-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 200 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name e6e87710b0340ab3_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 200 (WINWORD.EXE)
Type data
MD5 a00a2776babda229d05268b8305c6dc9
SHA1 784df45ea9d9fd5f07de73002d198e31a6b15c13
SHA256 e6e87710b0340ab3f6b6d7f11caf068e275c7edc486b84bf26e6ebf94700e9b4
CRC32 81762288
ssdeep 3:yW2lWRdEf/W6L7hZJK7rqVhuIt9ttnX:y1lWaWm9K7uVD9t9
Yara None matched
VirusTotal Search for analysis
Name a21ad7492550284d_~wrs{c4e2f51f-da36-49fc-b9d5-108ccc5c54a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C4E2F51F-DA36-49FC-B9D5-108CCC5C54A4}.tmp
Size 42.0KB
Processes 200 (WINWORD.EXE)
Type data
MD5 dc596e42a258e41ca0a7d390198c0e29
SHA1 25df926f120442a94e369a02b33ce3cfb923dda4
SHA256 a21ad7492550284dbdaa1abc854f3589a4995da05d8b41c2946b5d50bc2865b0
CRC32 BA9B8E1A
ssdeep 768:cs0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsf1ZSVnh2LfxkSy6TJZ:0DvwxKrK2f1uh2LxkSy6P
Yara None matched
VirusTotal Search for analysis
Name f4979dfb511698bc_~$mianozx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$mianozx.doc
Size 162.0B
Processes 200 (WINWORD.EXE)
Type data
MD5 02df6128e51e915ccbeec8ed87bf9af4
SHA1 302a76adfb1221e5553d377db8abeeb9796475de
SHA256 f4979dfb511698bcc70afd4023faf35fe0b9f1889a924ef2bb6717ef49bfd86c
CRC32 892E1BD8
ssdeep 3:yW2lWRdEf/W6L7hZJK7rqVhuIt9tt3/ll:y1lWaWm9K7uVD9tJ/ll
Yara None matched
VirusTotal Search for analysis