Dropped Files | ZeroBOX
Name 71bcf6ad8d40711c_~$r.dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$r.dot
Size 162.0B
Processes 1824 (WINWORD.EXE)
Type data
MD5 f7260de87579f539e7a904d64b7ff2e3
SHA1 21e759ef77df8d6fd5964aaa16cfc4f6fe8324c3
SHA256 71bcf6ad8d40711c86b188e8f17a36ad2ac93f682fe4f44c56878df469f8be8a
CRC32 4E533150
ssdeep 3:yW2lWRdvL7YMlbK7lZknavnDI:y1lWnlxK73tvnD
Yara None matched
VirusTotal Search for analysis
Name 1ff89a47eec7449b_~wrs{f16ac57e-561d-4c12-89c0-e3aaec389c46}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F16AC57E-561D-4C12-89C0-E3AAEC389C46}.tmp
Size 5.5KB
Processes 1824 (WINWORD.EXE)
Type data
MD5 325a75e6b5685a156817da16169bfd1c
SHA1 80b8a7d7ef2ae7de5c492673d066f0434e372b3d
SHA256 1ff89a47eec7449b98b3aef11525f5a089dc605f716873b922ce7f846b3c84d0
CRC32 2D57942C
ssdeep 96:8KWAwg/Ow/bBXBklf+zN8XB74y4fh1kxJcnalXt7bDFoH7NLHt/hiBUlg/:d7dBxBeXB7B4fQ/j2b5t/hkEA
Yara None matched
VirusTotal Search for analysis
Name b94d63d5a5bc4597_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1824 (WINWORD.EXE)
Type data
MD5 065071323ed6d1b6ea7980dc7d9d3f76
SHA1 600804b6debf471838f8a42c707fc73213bde375
SHA256 b94d63d5a5bc4597066cbc7843e863afbd601e75cde946ae5a59fe84b628ff95
CRC32 89F0E588
ssdeep 3:yW2lWRdvL7YMlbK7l:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{cdd192d3-0b12-4393-966b-e1ae4a03c10e}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CDD192D3-0B12-4393-966B-E1AE4A03C10E}.tmp
Size 1.0KB
Processes 1824 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis