Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{be4cda29-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDA29-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 444 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 22ca7f7750fbe031_~$tracted_at_0x24f11.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x24f11.rtf
Size 162.0B
Processes 444 (WINWORD.EXE)
Type data
MD5 f6eb83c5b2a852b570a829cd8d37ac40
SHA1 2b3a7813dd351c10b9f32b9769b455efb4a40f8d
SHA256 22ca7f7750fbe0319f7dde0926b72700cec7c299e005c8c011efeb475e1d73f7
CRC32 BFCD512E
ssdeep 3:yW2lWRdAwoW6L75VK7eRliIt1lIgzl/:y1lW0woWmVVK7eRD1lIst
Yara None matched
VirusTotal Search for analysis
Name 78d6844c4df632f1_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 444 (WINWORD.EXE)
Type data
MD5 0d8cbc8863a313773764b8eea27bdcda
SHA1 72b5d0043dab311366dc62533b5a24f36cf23947
SHA256 78d6844c4df632f18ef64f451ed7f22c5033de866e93fe47a289197eb2b66eb1
CRC32 A6A63E07
ssdeep 3:yW2lWRdAwoW6L75VK7eRliIt1lIAz/l:y1lW0woWmVVK7eRD1lIM/l
Yara None matched
VirusTotal Search for analysis
Name f6c88e104693db6f_~wrs{c4e2f51f-da36-49fc-b9d5-108ccc5c54a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C4E2F51F-DA36-49FC-B9D5-108CCC5C54A4}.tmp
Size 34.0B
Processes 444 (WINWORD.EXE)
Type data
MD5 47c5a4b4fe1ad2ce66cdfc4e0d1ed431
SHA1 ab26b75adc4d36264e4f1f6993439cda62a19b44
SHA256 f6c88e104693db6f49cac8ca3c41b36d9438a57e923ba6d1e06cfdaa95f83547
CRC32 BBACAA64
ssdeep 3:RloDlN0+d2clfn:Cd2clfn
Yara None matched
VirusTotal Search for analysis