Dropped Files | ZeroBOX
Name 0260f59ac1c6fe42_~$diplo.doc
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$diplo.doc
Size 162.0B
Processes 2364 (WINWORD.EXE)
Type data
MD5 407b7cde0ce83872509ee21ccd82dfec
SHA1 2d3e8d7750081075dac8db5c572d947b1e359d03
SHA256 0260f59ac1c6fe42639357bf7e80fdc8c081b487a26371d464eda30c4d02e775
CRC32 A2A5D923
ssdeep 3:yW2lWRdoldW6L74oK7jgkFItjlOMt:y1lWkdWmXK7fWjl7t
Yara None matched
VirusTotal Search for analysis
Name eab6711c2decb560_~wrs{dd12f9b6-104b-4771-b18e-fcc7725a012c}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DD12F9B6-104B-4771-B18E-FCC7725A012C}.tmp
Size 1.5KB
Processes 2364 (WINWORD.EXE)
Type data
MD5 9a0bbed9953ac73cd38c89654657eecb
SHA1 ba605e7cf11a8e34108bcf3d18bc0212b4c7b5a5
SHA256 eab6711c2decb560709e07f1ab45ab51669636a76eb3e06c8b94403710120a5f
CRC32 7BF12BBA
ssdeep 3:FlgAg7NNKElClDK/ldl5vWGePllHl3lldfZl/BAlVzNBmUE/wPxZlhRt3POD7jlF:fgFpUElClDK/CGePlIX8/wPxZfODwi
Yara None matched
VirusTotal Search for analysis
Name e545d395bb3fd971_~wrs{cea84d3a-5d53-4572-a2ab-8c042839b530}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEA84D3A-5D53-4572-A2AB-8C042839B530}.tmp
Size 2.0B
Processes 2364 (WINWORD.EXE)
Type data
MD5 32649384730b2d61c9e79d46de589115
SHA1 053d8d6ceeba9453c97d0ee5374db863e6f77ad4
SHA256 e545d395bb3fd971f91bf9a2b6722831df704efae6c1aa9da0989ed0970b77bb
CRC32 890098F7
ssdeep 3:X:X
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{8beffa56-6683-4fa6-960d-6e3b2e973a9a}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8BEFFA56-6683-4FA6-960D-6E3B2E973A9A}.tmp
Size 1.0KB
Processes 2364 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name b33d66c9dc1fce97_4434ea55.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4434EA55.emf
Size 4.9KB
Processes 2364 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 039600ea9469a239a7bc7aceaedc8180
SHA1 e7a39c9d7ad6788ebcc9887dcdcae7ef4e1979b7
SHA256 b33d66c9dc1fce97faa9443883a5321cb7f26ccb3925ef566a4d923dc73c2895
CRC32 8E69E82B
ssdeep 48:OMDLvNovJdsdBg6qjpLkwOEG6kpYjdHkpaatZN:bnVovJMBFq9gVU5EftZN
Yara None matched
VirusTotal Search for analysis
Name fdbf6b30f488bd72_diplo.doc.lnk
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\diplo.doc.LNK
Size 1.2KB
Processes 2364 (WINWORD.EXE)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 22 15:30:12 2021, mtime=Wed Sep 22 15:30:12 2021, atime=Wed Sep 22 15:30:12 2021, length=160256, window=hide
MD5 02db5ddbd8c6696a0cbe5ab8d586ec39
SHA1 bf1606af3ee32335ea18a5c9760ba70b5def84f2
SHA256 fdbf6b30f488bd72936cf9b32ba394e2ee61c37c697eb521bf031b6e7bfd0e4e
CRC32 7A9E3BBD
ssdeep 24:8YBhvyuvqVRdxzIoGBtzNYuTKqDCLPyeSR:8+vy4KXwtpYuTKHyx
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 354e5b8048066f8f_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2364 (WINWORD.EXE)
Type data
MD5 720dd7ee01555e43db050dada24422aa
SHA1 cf2d3d2e954bb0377a20278407e90eb690c42ef2
SHA256 354e5b8048066f8f2516d3bd371e1126382d27bfbc5b30a4dd99e43728876a8e
CRC32 A27D28EB
ssdeep 3:yW2lWRdoldW6L74oK7jgkFItjl2kn:y1lWkdWmXK7fWjld
Yara None matched
VirusTotal Search for analysis
Name 0f9614b15c1d4679_index.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\index.dat
Size 120.0B
Processes 2364 (WINWORD.EXE)
Type ASCII text, with CRLF line terminators
MD5 7455090d1d76ef1ab9c632c91be5c116
SHA1 3426135fbf05ffed4ea64720bc915777c1faea81
SHA256 0f9614b15c1d4679fc17aee32f11b06d9e72adc78013beea9318415f2fed6d44
CRC32 6F214E83
ssdeep 3:bDuMJlwcXAlWCZUJK1nzCmxWqJHp6rp2mX1621nzCv:bCkAkgUJUnzK9sgnzs
Yara None matched
VirusTotal Search for analysis
Name fc816f24645309db_6e5ac452.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6E5AC452.emf
Size 4.9KB
Processes 2364 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 4a700e862f09f479770116a6b68a2b54
SHA1 2b7c54aaa5733decddc318b25be68c958da083c1
SHA256 fc816f24645309dbe5db245a3d4b7af651cd175ac4c9b97b6d781e884db254ee
CRC32 C508BF55
ssdeep 96:Qbl3aPk7mS+Dan9MYpnY9GumWB6VR237gO4xwgnamn:QbL7ADa9MsnYoMB6VR2Lwugnh
Yara None matched
VirusTotal Search for analysis
Name 14a6c53d150fa0bd_~$22_2541267277276.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$22_2541267277276.doc
Size 162.0B
Processes 2364 (WINWORD.EXE)
Type data
MD5 b68270e6f436174b7a7a6a78583aff87
SHA1 7c581ed15ba81f25b9e9c47efc591d257c58ff00
SHA256 14a6c53d150fa0bd50adb86b77eb13879c75b7d5619e3421fcc7b7c3a02d9e5c
CRC32 A88229BD
ssdeep 3:yW2lWRdoldW6L74oK7jgkFItjl6mX:y1lWkdWmXK7fWjl6G
Yara None matched
VirusTotal Search for analysis