Dropped Files | ZeroBOX
Name 68e20d51c1cd91ff_~$althzx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$althzx.doc
Size 162.0B
Processes 1836 (WINWORD.EXE)
Type data
MD5 ba6cec216a80171e75d8047957189421
SHA1 7b5bf1efa2bdb1ed1f2f90c616a885e2948d0629
SHA256 68e20d51c1cd91ff4814dd29c8b8cb08c3d90ec37cc30ef9d5d2066862914b83
CRC32 62F3E673
ssdeep 3:yW2lWRd5W6L71MvK7+xkMFItk/g/n:y1lWlWmWK7+xHWk/g
Yara None matched
VirusTotal Search for analysis
Name 88d3e3ce992edd0f_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1836 (WINWORD.EXE)
Type data
MD5 dae706810edacc32ea8f998bd3d867ce
SHA1 9b0faf99154c6cace6d09e21b8ac285e687e9116
SHA256 88d3e3ce992edd0fdb5db33c0cac0831d140ab1d6da435e350eea5eccb432fa4
CRC32 42EB49EB
ssdeep 3:yW2lWRd5W6L71MvK7+xkMFItk/cWll:y1lWlWmWK7+xHWk/v/
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{be4cdd87-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDD87-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 1836 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 0da2efacd67acf3f_~wrs{c4e2f51f-da36-49fc-b9d5-108ccc5c54a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C4E2F51F-DA36-49FC-B9D5-108CCC5C54A4}.tmp
Size 41.0KB
Processes 1836 (WINWORD.EXE)
Type data
MD5 38d37b151aa325e5aebd323363e7a263
SHA1 d30777db5ce5e374533ce13c1c19ffc00b8c4654
SHA256 0da2efacd67acf3f90bf33d49a0bf3871e0fb3b31efa031f94f612aa5a24bb99
CRC32 6BDB0709
ssdeep 768:BgI2Q5Q6IQXwvW5Kq2g05gI2Q5Q6IQXwvW5Kq2g0jjhPRlhNTQ:6SyemuSyemHVRlrc
Yara None matched
VirusTotal Search for analysis