Dropped Files | ZeroBOX
Name 65957025c7832a9e_~$s.wbk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$s.wbk
Size 162.0B
Processes 3872 (WINWORD.EXE)
Type data
MD5 8394112b507ea899f582d8922e9e275d
SHA1 b91bf8b5f06a91792f13db146bec08ab82118351
SHA256 65957025c7832a9e488826b767d72b76bbea1261fb3dbd0aafe63f23caa2bbd1
CRC32 6E195C61
ssdeep 3:yW2lWRdvL7YMlbK7lnNPNmg:y1lWnlxK7FNPNx
Yara None matched
VirusTotal Search for analysis
Name 9c06bdc6af3fed33_~wrs{0fe9882b-272c-4625-8bdd-0030e07bbbc7}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0FE9882B-272C-4625-8BDD-0030E07BBBC7}.tmp
Size 3.5KB
Processes 3872 (WINWORD.EXE)
Type data
MD5 cc765a21dbea6734bdf5061d024b563e
SHA1 027e379d5798ea9ccfcaac3348879af0b3b91dc7
SHA256 9c06bdc6af3fed331f700b69396db5ec7b0e07864b53adf16a601ac3d235844c
CRC32 13AD9AB6
ssdeep 96:wyhQPhu3L8aSmRYJKRwlkEzkoG0aLVkVS8UYd:lQPU3L8a7LRwlkEICaL8d
Yara None matched
VirusTotal Search for analysis
Name b27244d22feb70c7_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3872 (WINWORD.EXE)
Type data
MD5 95fe47d3e29ff7244b440b931f2742f7
SHA1 74238773691eb13974bdcb3839ce6297f6f18abd
SHA256 b27244d22feb70c722196fbf4a6ef723e932574091c6b0997e8d38540cd65912
CRC32 801B45F2
ssdeep 3:yW2lWRdvL7YMlbK7l+:y1lWnlxK7g
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{4ec1eb67-4bc6-4c94-9543-e2babcb0cb29}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4EC1EB67-4BC6-4C94-9543-E2BABCB0CB29}.tmp
Size 1.0KB
Processes 3872 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis