Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{7b63237e-16d3-4b53-abe0-aac9f31f4d3d}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7B63237E-16D3-4B53-ABE0-AAC9F31F4D3D}.tmp
Size 1.0KB
Processes 2200 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 229462ba99302e5c_~wrs{2f39827f-4df2-47ce-af32-ad7d98be0f72}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2F39827F-4DF2-47CE-AF32-AD7D98BE0F72}.tmp
Size 14.5KB
Processes 2200 (WINWORD.EXE)
Type data
MD5 2fdf36ef7dc60f6c1a9f890130702edb
SHA1 9d40fb04029740c46e76e967d8a0e62a653869d1
SHA256 229462ba99302e5c4b15153c33b6a616e7f1f78f366d78bef4c5665a1069653a
CRC32 17774636
ssdeep 384:r3okl3Mq5YhdGZTML1LD9c/pJKRBCTwkw:rplcYJNML139c/p6Cm
Yara None matched
VirusTotal Search for analysis
Name d01241337aeb4f68_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2200 (WINWORD.EXE)
Type data
MD5 25f51c9fd851013907b14fc0f702c79e
SHA1 55a7556f0c30919e1ea7e752491ed32d2ffb4c2c
SHA256 d01241337aeb4f68cc1831a372d11e4316d4f145ecd464dc11366e36be8d56e4
CRC32 46B854D9
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItDFH/X+/lCT/:y1lWnlxK7ghqBH/6m/
Yara None matched
VirusTotal Search for analysis
Name 69d2545d75846661_~$cument.wbk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$cument.wbk
Size 162.0B
Processes 2200 (WINWORD.EXE)
Type data
MD5 dade25bab561e83e423cc905119fe486
SHA1 7aa64893983166169ae47be7ab5116243d926d80
SHA256 69d2545d758466618f8b97c40cb90f3dbf78549e05f0825433d62d8bace979b9
CRC32 6F410583
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItIXlf+/lCT/:y1lWnlxK7ghqIXlCm/
Yara None matched
VirusTotal Search for analysis