Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{ad8578ef-2d28-4e13-925a-ed715dda17c7}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AD8578EF-2D28-4E13-925A-ED715DDA17C7}.tmp
Size 1.0KB
Processes 2992 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name c347ddbe729b7eee_~$tracted_at_0x20db0.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x20db0.rtf
Size 162.0B
Processes 2992 (WINWORD.EXE)
Type data
MD5 cbf70552539648f3245ab2624fddeeae
SHA1 81c8f2377bbbd628ddde4db5d17fd213b622e0b7
SHA256 c347ddbe729b7eeea743c2e3958f483fe8d0ca5c66ef9eba8966fc0749b30a75
CRC32 D9BA61D4
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItSA6XhllFrll:y1lWnlxK7ghqD6xdj
Yara None matched
VirusTotal Search for analysis
Name fc3a22553b0b9c52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2992 (WINWORD.EXE)
Type data
MD5 4a1f4ab6408b7fdf10667af524456e21
SHA1 d967089a53ebfd34144d41b4163c08adf2401df7
SHA256 fc3a22553b0b9c52f3c622d5934a5b1793b2be06c92aa7cbb1b6c988ab4739fb
CRC32 13DE48BD
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt7mk/tyXhllFrll:y1lWnlxK7ghq7T/tyxdj
Yara None matched
VirusTotal Search for analysis
Name af0a56be96b2a4dd_~wrs{84522599-fc80-476a-bf08-e9df83ada39f}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{84522599-FC80-476A-BF08-E9DF83ADA39F}.tmp
Size 1.5KB
Processes 2992 (WINWORD.EXE)
Type data
MD5 cc36da492a3a4caeae3df0de9c811124
SHA1 f4bcda52fced4a1f2b5446823078f1ee0586de72
SHA256 af0a56be96b2a4ddc699f39954594804cbe52004b14b8824aafb396b64f26a31
CRC32 B45F6001
ssdeep 3:9lMlnlUJmT3BcPlpkt0u/n/lu/HFgstNTvlgl7vlIs:ET7adKt90FgMpmrn
Yara None matched
VirusTotal Search for analysis