Dropped Files | ZeroBOX
Name 4d01b47437251be9_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1000 (WINWORD.EXE)
Type data
MD5 9bf2fc0cf5fb85ccfd296cb3fe0862fb
SHA1 740a88352fdce0a9234d9dc6de9b77eb4b3a367f
SHA256 4d01b47437251be9b49f3392730fb97bb5bac31601c5b60203803b904fb57327
CRC32 2222609A
ssdeep 3:yW2lWRdc41W6L7sLJK7mt4kItRH4zRl/l:y1lWn1Wm8K7muDaf/l
Yara None matched
VirusTotal Search for analysis
Name 8232c1113ddd0060_~$mimi.ps1
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$mimi.ps1
Size 162.0B
Processes 1000 (WINWORD.EXE)
Type data
MD5 edab5b9f0496fe261d1968187b1d08ae
SHA1 eccf044a555e68632239f60830258fe813283706
SHA256 8232c1113ddd00606507faa9430ef96bbb1932c127719d17f4aba81191882bc7
CRC32 062902A6
ssdeep 3:yW2lWRdc41W6L7sLJK7mt4kItRH4zh/l:y1lWn1Wm8K7muDa3
Yara None matched
VirusTotal Search for analysis
Name b894517b7886665d_~wrs{c078a10f-a19e-49c5-8ea0-01fe78276da4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C078A10F-A19E-49C5-8EA0-01FE78276DA4}.tmp
Size 1.5KB
Processes 1000 (WINWORD.EXE)
Type data
MD5 c4a9c245e25316f08846acd3850044be
SHA1 dee23bfbb48b0a1ec9a50f6b31fac72b227a1409
SHA256 b894517b7886665ddc879729be8f5dc7ee8655222e29a60a544a6302303bac1b
CRC32 0B4A3BA5
ssdeep 6:IiiiiiiiiiI4/9+Qc8++lPkalT4Mu8lPloBl/t:W49+QG+3/o
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{be4cdf3f-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDF3F-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 1000 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 1485390ad43511bb_~wrs{b7493760-2240-4a26-a29b-7f9cd6270ac9}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B7493760-2240-4A26-A29B-7F9CD6270AC9}.tmp
Size 1.3MB
Processes 1000 (WINWORD.EXE)
Type data
MD5 9712506b4640796839990ee3771fc9d2
SHA1 4f3ee204b83c926de1f0f1482add0d0af076aad1
SHA256 1485390ad43511bb34ef9fe105a0a1171dc30abd77134ae47a0f16fab1bb493c
CRC32 0A70C004
ssdeep 12288:aXJ+yEc1+9TW6P2Wt3cEuEcEIBrp7DU9c2Pf9:aZ9Ec1H1Wt31qEAp74u2X9
Yara
  • Vidar_IN - Vidar
VirusTotal Search for analysis