Dropped Files | ZeroBOX
Name fb4187af33a0e8e2_~wrs{9281c1aa-61d7-4c9e-a5ba-df05eda78561}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9281C1AA-61D7-4C9E-A5BA-DF05EDA78561}.tmp
Size 4.4KB
Processes 2744 (WINWORD.EXE)
Type data
MD5 afc075d51a6bb7b6a6a1cde9b5ef39e8
SHA1 c0196b12074d178f7aed16c27eb06b02a75a8961
SHA256 fb4187af33a0e8e215ed626a9b74124f7210f88f04258734fa619ffdfbc2b95b
CRC32 4280F541
ssdeep 96:hcRpGEAfpjLcQ1hFhtwriZp7Ux8cxPwsQHUZ3:hOypjLcIhF7Br7+x3
Yara None matched
VirusTotal Search for analysis
Name af7b536fa3babf93_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2744 (WINWORD.EXE)
Type data
MD5 0bde4514ad907deeb4fe84af456107b4
SHA1 fd88e283d87c7fa66c5748bfffd605b855ad5715
SHA256 af7b536fa3babf93e42c9033d52be536de80de0d1c9cca16379b7d7919737d4a
CRC32 D8E6BEBF
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVt3ZtFXUn:y1lWnlxK7ghqqFJjU
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{d0fca1a2-b550-4d45-b5b4-123da1846984}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D0FCA1A2-B550-4D45-B5B4-123DA1846984}.tmp
Size 1.0KB
Processes 2744 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name ee7d98e29257b033_~$v_1123.wbk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$v_1123.wbk
Size 162.0B
Processes 2744 (WINWORD.EXE)
Type data
MD5 64ec2cdaacf4c54b5efa3e88129a481e
SHA1 1a8ef18c40b841dbf530aabd854b089004fb8aa0
SHA256 ee7d98e29257b0334f1c9fec16e4a835c1c09acfaaa6023383cc99a8b74d4e3c
CRC32 1C6754B5
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtyllldXUn:y1lWnlxK7ghqqFyllU
Yara None matched
VirusTotal Search for analysis