Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{31d356ca-5cdc-4ae5-9630-1138e3515487}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31D356CA-5CDC-4AE5-9630-1138E3515487}.tmp
Size 1.0KB
Processes 1932 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 2c8ca3a549d24fb6_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1932 (WINWORD.EXE)
Type data
MD5 e2e3209078b2eed2d1f18e7329727d93
SHA1 9fdbfbd74f984d3746aafda22845ce72d23ad559
SHA256 2c8ca3a549d24fb66a26de44fce5e11f23f715c55dc17d61a74c5f58bffb65c0
CRC32 98E6AC3A
ssdeep 3:yW2lWRdjoXW6L7nthJK79ubkItzkLSl/:y1lWYXWmLVK7knzkLG
Yara None matched
VirusTotal Search for analysis
Name 9a0c8e8b07e0f2a3_~$ocx006.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$ocx006.docx
Size 162.0B
Processes 1932 (WINWORD.EXE)
Type data
MD5 dfdc24728b338f62a102f74f431c20b8
SHA1 dbea7d493bb208cdf9c1ddf794731dfa2a621b75
SHA256 9a0c8e8b07e0f2a311202687a927b106953c56ac7ac7e4c212ac58ec8331bac4
CRC32 86BB851D
ssdeep 3:yW2lWRdjoXW6L7nthJK79ubkItzkFrdl/l:y1lWYXWmLVK7knzkFDt
Yara None matched
VirusTotal Search for analysis