Dropped Files | ZeroBOX
Name bfe482c4e2cfd747_~$.......dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$.......dot
Size 162.0B
Processes 2076 (WINWORD.EXE)
Type data
MD5 64d1555a193c1a02086a9991b75bd64c
SHA1 7411b45d5f7d6444e31af08778b8b70f8818a566
SHA256 bfe482c4e2cfd7479cd7a1324ce55d902241d6c978f5ff753e6a40f88e3bbc24
CRC32 37BFEFCE
ssdeep 3:yW2lWRdvL7YMlbK7lZ7nGyI:y1lWnlxK737nGl
Yara None matched
VirusTotal Search for analysis
Name 3c345887b502383d_~wrs{f16ac57e-561d-4c12-89c0-e3aaec389c46}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F16AC57E-561D-4C12-89C0-E3AAEC389C46}.tmp
Size 14.5KB
Processes 2076 (WINWORD.EXE)
Type data
MD5 cf95677d272f06f62dae2f21219db853
SHA1 8c40b86284430a4302c2b673646e8ff6808a5d86
SHA256 3c345887b502383d9e1cfcbf4ed622f277d7e582ea0e4f2d7073181db8b1f728
CRC32 F45AB666
ssdeep 384:53hxUOa4e1AJzNKcjwbVWINZrd+XeYnr43V6E:vx1jzkoUWoZhw543X
Yara None matched
VirusTotal Search for analysis
Name b94d63d5a5bc4597_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2076 (WINWORD.EXE)
Type data
MD5 065071323ed6d1b6ea7980dc7d9d3f76
SHA1 600804b6debf471838f8a42c707fc73213bde375
SHA256 b94d63d5a5bc4597066cbc7843e863afbd601e75cde946ae5a59fe84b628ff95
CRC32 89F0E588
ssdeep 3:yW2lWRdvL7YMlbK7l:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{cdd192d3-0b12-4393-966b-e1ae4a03c10e}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CDD192D3-0B12-4393-966B-E1AE4A03C10E}.tmp
Size 1.0KB
Processes 2076 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis