Dropped Files | ZeroBOX
Name 262ac232acebe3c6_~$tracted_at_0x1f93b.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x1f93b.rtf
Size 162.0B
Processes 3052 (WINWORD.EXE)
Type data
MD5 f93c13499065fe293d3dc314a4f5efc9
SHA1 d139928643b77764895af9f18261cafb7e4dcbbd
SHA256 262ac232acebe3c6410b43d055b943f6b889163375887020492863b578a7046c
CRC32 24F4E742
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt4ll/4XhllFrll:y1lWnlxK7ghq4lt4xdj
Yara None matched
VirusTotal Search for analysis
Name fc3a22553b0b9c52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3052 (WINWORD.EXE)
Type data
MD5 4a1f4ab6408b7fdf10667af524456e21
SHA1 d967089a53ebfd34144d41b4163c08adf2401df7
SHA256 fc3a22553b0b9c52f3c622d5934a5b1793b2be06c92aa7cbb1b6c988ab4739fb
CRC32 13DE48BD
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt7mk/tyXhllFrll:y1lWnlxK7ghq7T/tyxdj
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{b74e82fe-ed16-4d90-8a60-a8f2b4c257c8}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B74E82FE-ED16-4D90-8A60-A8F2B4C257C8}.tmp
Size 1.0KB
Processes 3052 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 0ba5a3245b83cd4c_~wrs{09bbb0ee-315b-4fb2-b665-81084752a142}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{09BBB0EE-315B-4FB2-B665-81084752A142}.tmp
Size 120.0B
Processes 3052 (WINWORD.EXE)
Type data
MD5 592bc36bb3fbd29b98e9913124b69cb3
SHA1 bc2869ac08f318d9cb6ebd4767834df1ec6e442f
SHA256 0ba5a3245b83cd4c5ad0cc08e46275b5b42e0af8ad35e88ee3313d9bbc765a43
CRC32 5632B0D1
ssdeep 3:rlILlN0zyBclfEPlQG6sFliAFlDSGl+wK/K46VoW:MBclfEdQGTig/l9K/K4eoW
Yara None matched
VirusTotal Search for analysis