Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{be4cdabe-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDABE-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 1184 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name f6bc9a200345608d_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1184 (WINWORD.EXE)
Type data
MD5 af9630beb932c3f9131ab9acf3d98ab6
SHA1 ea24c565cdc0e47385ae4267f700a3da6ad13e9b
SHA256 f6bc9a200345608d82d16843ce825c2b82fbd592cf2d40573bdc87892967adbe
CRC32 DF54C7B6
ssdeep 3:yW2lWRd6O/dW6L7/uJK7D1iItNe/kh2Nlllln:y1lW20WmaK7nUkA3/l
Yara None matched
VirusTotal Search for analysis
Name 20f160e0e3260e16_~wrs{c4e2f51f-da36-49fc-b9d5-108ccc5c54a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C4E2F51F-DA36-49FC-B9D5-108CCC5C54A4}.tmp
Size 20.0B
Processes 1184 (WINWORD.EXE)
Type data
MD5 2b69ff26ad8cfd61854054ae33b42b08
SHA1 1f6a02f892d402e2e5e5526bb899150a8092f207
SHA256 20f160e0e3260e166f6373dec038364826260124c86286724cfd0c08a8116ddb
CRC32 CA328D77
ssdeep 3:slClKlAFLQfl:slCwxN
Yara None matched
VirusTotal Search for analysis
Name b80e1c19ec06cce8_~$tracted_at_0x23e32.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x23e32.rtf
Size 162.0B
Processes 1184 (WINWORD.EXE)
Type data
MD5 7872b69db68b539abf39b7960738091a
SHA1 7510a619bdb894749909e579fcb81330daa10e2d
SHA256 b80e1c19ec06cce8594a61f72d59e73f9f63b363abf8285ddaffd89c046497cd
CRC32 8A52F4CF
ssdeep 3:yW2lWRd6O/dW6L7/uJK7D1iItNe/khtotn:y1lW20WmaK7nUk8t
Yara None matched
VirusTotal Search for analysis