Dropped Files | ZeroBOX
Name fc00dd591e7e880e_~$1.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$1.doc
Size 162.0B
Processes 112 (WINWORD.EXE)
Type data
MD5 e9bfcd1e3f8a4901d791693f1766410b
SHA1 c17b22e35d18215d1aa6bd04cf2fd9c6b1de7cc4
SHA256 fc00dd591e7e880e85755856574f775da659fec3416ce6540a2da6c692e2568d
CRC32 9944517F
ssdeep 3:yW2lWRdvL7YMlbK7lZD5n/l:y1lWnlxK731n
Yara None matched
VirusTotal Search for analysis
Name 17e34534b397e86b_587b1a12.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\587B1A12.dat
Size 1.3KB
Processes 112 (WINWORD.EXE)
Type Targa image data - Map - RLE 432 x 65536 x 0 +3 "\260\001"
MD5 b7e11ccaf5d387c26611024f567dfdf6
SHA1 6679c99fec1d3f90d900e0b7cfa454d0a91b466a
SHA256 17e34534b397e86b79ebab4d1a282c49fb5014ac76bcad745861a4d21230f75a
CRC32 1B7726B3
ssdeep 24:tmNTlwzPJ7gu++CvaH08bnv3URaA7wR99Vl:kNkNgu++Wa7vEaEwR99P
Yara None matched
VirusTotal Search for analysis
Name d0bebe93c874a548_~wrs{09197f61-8228-49c5-8a1d-3681f55c655e}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{09197F61-8228-49C5-8A1D-3681F55C655E}.tmp
Size 1.6KB
Processes 112 (WINWORD.EXE)
Type data
MD5 f68a2e5708c57623eb7a8adce829d14a
SHA1 86393197df303ba200463a1e998769421d8a0f56
SHA256 d0bebe93c874a548bbcc522834cb402bf11e1ff6e6979920a09560f675d38dc5
CRC32 5C948F1A
ssdeep 24:3jKjKjKjKjKjKjKjKjKjol53uxflldWH1W0WH4ijKD:7lwxYHQ9H43
Yara None matched
VirusTotal Search for analysis
Name 349eb6b6fa7fe7ee_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 112 (WINWORD.EXE)
Type data
MD5 e77b47eae52ea536ee260f98d19c202d
SHA1 f120af698e4b7a639a99f7dd4b0a5d070af4e750
SHA256 349eb6b6fa7fe7eecb56c9b6ecbcbf50686305e6bf9888864b332a0dc259b7d9
CRC32 767E022F
ssdeep 3:yW2lWRdvL7YMlbK7lBn/l:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{49f0111d-868e-4fa0-b0e0-7477ab9be03f}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{49F0111D-868E-4FA0-B0E0-7477AB9BE03F}.tmp
Size 1.0KB
Processes 112 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis