Dropped Files | ZeroBOX
Name 28ff16247cfb95d3_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1020 (WINWORD.EXE)
Type data
MD5 84b14eb3cc40580c1d720a3edbf8bb6b
SHA1 287c782e52f117a7d5aee40d5c24cbbc31741835
SHA256 28ff16247cfb95d327a2d99ca074a7727d3b44b50992270b2780440ec8300c46
CRC32 0EC7DD2D
ssdeep 3:yW2lWRdQW6L7oudK7AAukFIt5lwI/l:y1lW0WmMeK7AAukW5uI/l
Yara None matched
VirusTotal Search for analysis
Name c63920cab026c744_~wrs{3e39afe3-5796-4011-a28a-9c3404f39f93}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3E39AFE3-5796-4011-A28A-9C3404F39F93}.tmp
Size 16.0B
Processes 1020 (WINWORD.EXE)
Type data
MD5 478691e1a8b4bbdc70745f6451729840
SHA1 7e577d1f6dad085d96dc8f3e56fd309c82e526d6
SHA256 c63920cab026c74422e1abf752b2361da8ef98b692baf675576f42fc75efbfd4
CRC32 744EA5B5
ssdeep 3:EslxGFln:EslxWn
Yara None matched
VirusTotal Search for analysis
Name 21d9d2da0dc67152_~$tracted_at_0x1d24e.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x1d24e.rtf
Size 162.0B
Processes 1020 (WINWORD.EXE)
Type data
MD5 ae71efd4d16388d77abc36bcf0c4d9e9
SHA1 6696dfc14089d8971fa9a4c25c64af6b405deb7f
SHA256 21d9d2da0dc67152f45df206a3d11ff0c4300460e7d4792c966411572affd735
CRC32 F01E4B15
ssdeep 3:yW2lWRdQW6L7oudK7AAukFIt5lAEXn:y1lW0WmMeK7AAukW5eEXn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{7a9b3f3b-35e4-488e-98ac-7e21461955dd}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7A9B3F3B-35E4-488E-98AC-7E21461955DD}.tmp
Size 1.0KB
Processes 1020 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis