Dropped Files | ZeroBOX
Name b1364ca1b52c1b59_~$n.wbk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$n.wbk
Size 162.0B
Processes 2792 (WINWORD.EXE)
Type data
MD5 4bb26593a768c76250fb0b3a743e1087
SHA1 fbd6a59518fd36e7edde9274f9621d8271c48cf8
SHA256 b1364ca1b52c1b59b51f7abb49beaa801c73166370d1cf65a90ab56b1ed06b60
CRC32 CDD1D7C9
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtSXlFXUn:y1lWnlxK7ghqqFSXlVU
Yara None matched
VirusTotal Search for analysis
Name ccd4e8a25fbc2803_~wrs{f9afa81b-ad20-4bf1-a6f0-506e18d0f7f0}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F9AFA81B-AD20-4BF1-A6F0-506E18D0F7F0}.tmp
Size 5.2KB
Processes 2792 (WINWORD.EXE)
Type data
MD5 c8a90f8c069331423702d8266d7fdfd8
SHA1 4e8c2486683ddaad1d745bf7d6ec5dbd54a3fcee
SHA256 ccd4e8a25fbc28031f8f4a59e9421df02e66c92282ee200c28cd76575fd61bad
CRC32 05D05FC7
ssdeep 96:rLQs2oMHBY9hEIgLY8Urjaa3J3gf9QCwOmfdlC4xsR5GJqaUh:3QFoMHB8mujH53I9QCXmXCN/GJqV
Yara None matched
VirusTotal Search for analysis
Name af7b536fa3babf93_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2792 (WINWORD.EXE)
Type data
MD5 0bde4514ad907deeb4fe84af456107b4
SHA1 fd88e283d87c7fa66c5748bfffd605b855ad5715
SHA256 af7b536fa3babf93e42c9033d52be536de80de0d1c9cca16379b7d7919737d4a
CRC32 D8E6BEBF
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVt3ZtFXUn:y1lWnlxK7ghqqFJjU
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{e1fc3910-bb09-4db7-8300-f01c28cf7993}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E1FC3910-BB09-4DB7-8300-F01C28CF7993}.tmp
Size 1.0KB
Processes 2792 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis