Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{66299bbf-7aa5-47eb-bdd6-6c30d179f1fe}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{66299BBF-7AA5-47EB-BDD6-6C30D179F1FE}.tmp
Size 1.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name b530c41ce3f7df16_~wrd0001.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0001.doc
Size 32.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 5c3791c51c89677a2b879fcd4e182b18
SHA1 e83691be7e61a50ffd5329ab388a19402cf3030a
SHA256 b530c41ce3f7df16ba50621dd2b836b600b1600f14e5d89b241d71363c9b6392
CRC32 02267CC3
ssdeep 384:5e7BM2uToSF14A8DQaimhBDVz2+iKaCby7LUOf9:58BGToSqsxmhBDiUG7Lff9
Yara
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 5d6ef4d41e9968fb_~wrd0000.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0000.doc
Size 43.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 50a0256e33cbfd2d2e7e8233160b16ca
SHA1 c4a142e1cf81ad0d6bb0ce3325c82b6fed0bf945
SHA256 5d6ef4d41e9968fbcc41225c7d54abbf163dfd1e4215af725a624fa8367f2c86
CRC32 644E0582
ssdeep 384:5e7BM2uToSF14A8DQaimhBDVz2+iKaCby7LUOfeaHrJKtsZVKJYFL:58BGToSqsxmhBDiUG7LffX1VZ
Yara
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis
Name 51fcdf3a76b6692e_~wrs{534f9a98-6e69-4969-9602-ed4b82c451e2}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{534F9A98-6E69-4969-9602-ED4B82C451E2}.tmp
Size 1.5KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 fb055c389208800f928b3502a6615abe
SHA1 14564d6e0e4ec0f9717c16471b75e44b5868290a
SHA256 51fcdf3a76b6692eaa84d280b39bdc081cf6e4808171e0ec0484229648400ae9
CRC32 640E2478
ssdeep 6:IiiiiiiiiiE/bYflo30XOnySySkssqA1+tKfn:S/XkeySpk1j1+tKfn
Yara None matched
VirusTotal Search for analysis
Name 88ea3507b55e9bc0_~$2fd62fafe61f46ad967c84dd7fbca80d31ad4729fed051d527d9ba45857fd6.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$2fd62fafe61f46ad967c84dd7fbca80d31ad4729fed051d527d9ba45857fd6.doc
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 4130bea0107d37b25e235bf914d797d2
SHA1 e5d5a3fab11eba7135b0e5e67f07f3f436c511af
SHA256 88ea3507b55e9bc0faa086c0e79482aa70f5c881ab15bd56e80139936ce32add
CRC32 D83F3F6A
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtzmXyXhn:y1lWnlxK7ghqqFKixn
Yara None matched
VirusTotal Search for analysis