Dropped Files | ZeroBOX
Name 17ac8152cfb449fc_~$f.wbk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$f.wbk
Size 162.0B
Processes 2852 (WINWORD.EXE)
Type data
MD5 5c52bf729a3547e75e5047b4c0507028
SHA1 c5432662755318443dd540a1c693f065154c93fc
SHA256 17ac8152cfb449fcec42c00589dc362c4465c5566da8838087e0f79c8a6cd389
CRC32 4F1586F7
ssdeep 3:yW2lWRdvL7YMlbK7lZwnujnDR:y1lWnlxK73ljnD
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{1bcc3581-0bee-4026-8aa3-46b12efbf6c9}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1BCC3581-0BEE-4026-8AA3-46B12EFBF6C9}.tmp
Size 1.0KB
Processes 2852 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 945612927f28c8f1_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2852 (WINWORD.EXE)
Type data
MD5 dd1320a1248e83803fb2bcc3f33e1dcf
SHA1 c93723e46b06a2edc3eacff8560cd5dc7044c27b
SHA256 945612927f28c8f14b25eff982cb65c307fb71e58fb884b0c051277729980a70
CRC32 4BEC6349
ssdeep 3:yW2lWRdvL7YMlbK7ldnlX:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 8db367967db411c4_~wrs{6738c4be-a566-4b74-b75e-29e8018e7106}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6738C4BE-A566-4B74-B75E-29E8018E7106}.tmp
Size 16.0KB
Processes 2852 (WINWORD.EXE)
Type data
MD5 65eef7082f364840d4bb7e38d1c789bf
SHA1 4b800129ff48d86876d17d99a6a0a1fb7509dce3
SHA256 8db367967db411c4a033e3a5d43c31069b04e6089bec63ba5f6395e97dfdb9bd
CRC32 5BD8A76F
ssdeep 384:rUbi7sZfne0l2UIXyy7dWuh4EX5tLdEq/Fm7ZomdlJPXNg873SQrzRE:8Bnwiy7dWO5dE4U1oiLfG87SQpE
Yara None matched
VirusTotal Search for analysis