Dropped Files | ZeroBOX
Name e2c566b774387e27_~wrs{e0e3070c-52b1-488a-8261-56709ab34352}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E0E3070C-52B1-488A-8261-56709AB34352}.tmp
Size 3.7KB
Processes 2188 (WINWORD.EXE)
Type data
MD5 1224ca231448809662aa9df6ba4417e9
SHA1 bc13f793b50adc27e2289c5c218c95e7cf13a4d1
SHA256 e2c566b774387e2797d0d4e4c207a4291855f4b5d020e56eca857e7297d4e35a
CRC32 E11778F5
ssdeep 96:w1xo5F95RJA6ZyrRNyM43G+V2u47OYUQlp:Sxo5X5Ar7yM4Cp7
Yara None matched
VirusTotal Search for analysis
Name 66300f6637c143e4_~$z....wiz.wiz
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$z....wiz.wiz
Size 162.0B
Processes 2188 (WINWORD.EXE)
Type data
MD5 af993784cf8ea351d009665a56a74360
SHA1 d340485e98421764eb69d8b56cb770f853974c2c
SHA256 66300f6637c143e47c12fc965dfdfe0d897034b92aef20030f77c606b018a328
CRC32 2BF8BBB7
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItslP+/lCT/:y1lWnlxK7ghqslSm/
Yara None matched
VirusTotal Search for analysis
Name d01241337aeb4f68_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2188 (WINWORD.EXE)
Type data
MD5 25f51c9fd851013907b14fc0f702c79e
SHA1 55a7556f0c30919e1ea7e752491ed32d2ffb4c2c
SHA256 d01241337aeb4f68cc1831a372d11e4316d4f145ecd464dc11366e36be8d56e4
CRC32 46B854D9
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItDFH/X+/lCT/:y1lWnlxK7ghqBH/6m/
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{b9822884-09d7-4dd9-ae72-3774bced4dd2}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B9822884-09D7-4DD9-AE72-3774BCED4DD2}.tmp
Size 1.0KB
Processes 2188 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis