Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{78ab9426-9620-4dc2-911d-256b498dfc69}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{78AB9426-9620-4DC2-911D-256B498DFC69}.tmp
Size 1.0KB
Processes 2096 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d5a744201e01216f_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2096 (WINWORD.EXE)
Type data
MD5 b69a71b2bffa02ab11b9e0d143abf3fe
SHA1 486c41bdb008b041482ac22fbeb2c14a0798c93e
SHA256 d5a744201e01216f109e9c9fd25d759cd2f7fe39261d40f3c0fd8a130047f46c
CRC32 FEB9A7D0
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItp7Da/NCT/l:y1lWnlxK7ghqp7G/Nm/l
Yara None matched
VirusTotal Search for analysis
Name 406836ff9ff4e730_b4c9bb3b.wmf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B4C9BB3B.wmf
Size 314.0B
Processes 2096 (WINWORD.EXE)
Type Targa image data - Map - RLE 28 x 65536 x 0 +2 "\005"
MD5 228531bfea0dc5f27a11c0c0a98d03d1
SHA1 144a036d44614fd33d9340d7e5400c84cde6d374
SHA256 406836ff9ff4e7303f6cbc8ff2c79c1b1767978732f826cf37c50ee8b5e307df
CRC32 3DA9C2A9
ssdeep 6:M49Ot2oto90ogtwRozWE4S/GbVJGpQuQSTzvkIsVlE49OXC1ynuKbg/p8V6klct:M49DeFObDGfHTzvNMeGOXCYnhbg06s0
Yara None matched
VirusTotal Search for analysis
Name 51fcdf3a76b6692e_~wrs{7e5687ec-06ed-4621-9a0b-d1c0885876bb}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7E5687EC-06ED-4621-9A0B-D1C0885876BB}.tmp
Size 1.5KB
Processes 2096 (WINWORD.EXE)
Type data
MD5 fb055c389208800f928b3502a6615abe
SHA1 14564d6e0e4ec0f9717c16471b75e44b5868290a
SHA256 51fcdf3a76b6692eaa84d280b39bdc081cf6e4808171e0ec0484229648400ae9
CRC32 640E2478
ssdeep 6:IiiiiiiiiiE/bYflo30XOnySySkssqA1+tKfn:S/XkeySpk1j1+tKfn
Yara None matched
VirusTotal Search for analysis
Name e1da618dca45259f_~$1.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$1.rtf
Size 162.0B
Processes 2096 (WINWORD.EXE)
Type data
MD5 40c51cab729de3127d02ff65ecad4958
SHA1 06f5ebebb868a9c0863e8bd02d91aa391627e381
SHA256 e1da618dca45259fafd1d1211b0160801f780ca6485eb4dd7e678e50c9ed9adf
CRC32 71AA0318
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItisqDa/NCT/l:y1lWnlxK7ghqisqG/Nm/l
Yara None matched
VirusTotal Search for analysis
Name 6a43fe620eae2ee8_~wrs{07c1d958-36f0-4e5d-9996-dd49da6e3516}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{07C1D958-36F0-4E5D-9996-DD49DA6E3516}.tmp
Size 6.3KB
Processes 2096 (WINWORD.EXE)
Type data
MD5 2b1021a1ff9d3c4432bce27bcae035fa
SHA1 a6450672d4e3b4e4f6335a09231baf343e9b2e03
SHA256 6a43fe620eae2ee87d21134192e95917f9708fde1746e9ecd0696481b9db967c
CRC32 5F7952B2
ssdeep 96:F+hwDrn2T/xgz1AnSnlltuqO2jVfVjWbEaKFKDZqwm7maeOA:F+hwDr2T/WFuD2j7jUKFkZ7ymaPA
Yara None matched
VirusTotal Search for analysis