Dropped Files | ZeroBOX
Name 0c02b8a246ea58d9_~wrs{c3478e78-0471-4684-b992-ae3dca60fd0f}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C3478E78-0471-4684-B992-AE3DCA60FD0F}.tmp
Size 3.5KB
Processes 732 (WINWORD.EXE)
Type data
MD5 55736b7fbda6c58b3b3c912bb9268bc4
SHA1 d01977665ebbae90730d20e5d77e945ab30f1b55
SHA256 0c02b8a246ea58d9e0af9824d28474dc4ec36283244d45c727dfcbb2a3433f57
CRC32 B8B4F75C
ssdeep 48:E6K72RWlMLohqXJkskgilJG8LaMAElT51SCOVt7ylRQFLPgFN2QWl5WK8rgOWUt:EL2Qhq5igOG8WMBCVhQRWDgFNhaT1bUt
Yara None matched
VirusTotal Search for analysis
Name 5ec1ff15f26c3959_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 732 (WINWORD.EXE)
Type data
MD5 5ea4e48efa6f5719d6f5ee02bdc4aac4
SHA1 af4f005be42f8127ba439208ad5f5379ebc92f93
SHA256 5ec1ff15f26c39591cc112f5884f624cea464ccf3f915056a71659ed46a56e44
CRC32 42980862
ssdeep 3:yW2lWRdvL7YMlbK7lYt:y1lWnlxK7O
Yara None matched
VirusTotal Search for analysis
Name abe064f68fc89410_~$s.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$s.doc
Size 162.0B
Processes 732 (WINWORD.EXE)
Type data
MD5 49926f8510d51778fac275b8204d20cb
SHA1 c202523198c5bbda6664315af931e003b374e449
SHA256 abe064f68fc89410fe837e3e87bd0c292c186fc0a3844a5a81e80ae232236d10
CRC32 E27769D6
ssdeep 3:yW2lWRdvL7YMlbK7lZiGmlYt:y1lWnlxK73iY
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{5f8b61f0-3c4f-4530-a0a2-26cab4cfd072}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5F8B61F0-3C4F-4530-A0A2-26CAB4CFD072}.tmp
Size 1.0KB
Processes 732 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis