Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{b945009c-aa03-4017-a280-ce7561412a2a}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B945009C-AA03-4017-A280-CE7561412A2A}.tmp
Size 1.0KB
Processes 2632 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d8a384390033973b_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2632 (WINWORD.EXE)
Type data
MD5 66aa6ce5946fb93fa8ed38bf3b50f3ea
SHA1 1a803d5ae7e501f117ad0da5b7bb190eb81e3365
SHA256 d8a384390033973b3e0fc63fc57963802f6459f2c2e88cdf6dcb323d6c73100c
CRC32 0044B0A4
ssdeep 3:yW2lWRdvL7YMlbK7l/nl:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 60a53519fbefe628_~wrs{472319d2-1845-4455-b1c9-3da3ee4b2736}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{472319D2-1845-4455-B1C9-3DA3EE4B2736}.tmp
Size 10.5KB
Processes 2632 (WINWORD.EXE)
Type data
MD5 4009da06fb54bf20fb364cf477e7bf5d
SHA1 aebd51ba4b443585fe006098af29a336ab90d00c
SHA256 60a53519fbefe62892c527ff04405c1c370a175d63e96bd3c54750811c2f9af6
CRC32 BF66CB4A
ssdeep 192:CI5OaOgsmUDL8kJ1074xB8qT28O9q1YSNEa2gJ428Sh+k:CI6gsmUD4wl3vHuSCgJik
Yara None matched
VirusTotal Search for analysis
Name a0ae0bd399684348_~$x.x.xx.x.xx.x.x.x.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$x.x.xx.x.xx.x.x.x.doc
Size 162.0B
Processes 2632 (WINWORD.EXE)
Type data
MD5 cb154eb5ea5ecefec9c3939b7660ed00
SHA1 cb30786df8ceb7a522b331620ccf0e601e5ce7c6
SHA256 a0ae0bd399684348bcb9678870e6f6cc66223211543f4d34b0319153caf03e75
CRC32 7FE94744
ssdeep 3:yW2lWRdvL7YMlbK7lhZqnNWVlnD:y1lWnlxK7R1lnD
Yara None matched
VirusTotal Search for analysis