Dropped Files | ZeroBOX
Name 815f308835606014_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2540 (WINWORD.EXE)
Type data
MD5 731244220e4ec6d378c7d05824f99e87
SHA1 1ff8802067f5cf9123094ad8ec6a8894f4ef9d53
SHA256 815f3088356060149d06d5222942d7ab92177d2e3c4871d7205800b0f0a9dd9e
CRC32 46F2130E
ssdeep 3:yW2lWRdvL7YMlbK7lbnl:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 16898ebc45bb4f21_~wrs{e89e5fc0-8f4b-42b1-9755-0520fa4bd3cb}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E89E5FC0-8F4B-42B1-9755-0520FA4BD3CB}.tmp
Size 42.0B
Processes 2540 (WINWORD.EXE)
Type data
MD5 ef93bccb97c785a9b1a8ae9d49ad9e9d
SHA1 cde173e7cb06949ef11e013ef14ed8be73ec8537
SHA256 16898ebc45bb4f21e7ffd97212610db2eab063aac745b676fc8d4dbd06a32763
CRC32 256F2772
ssdeep 3:Zl0meIKlAIuj4Bfln:o3fHukr
Yara None matched
VirusTotal Search for analysis
Name 3d6af5660bfe8b24_~$tracted_at_0x24b56.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x24b56.rtf
Size 162.0B
Processes 2540 (WINWORD.EXE)
Type data
MD5 58140367fcd4170ea8cec4e58bf85d49
SHA1 8a420da03a8d8ff0cd99beed0792a21248d5b23b
SHA256 3d6af5660bfe8b2449911c7d1094de242fd234948fadd22b78f8efb946a972e6
CRC32 0E5F4CAE
ssdeep 3:yW2lWRdvL7YMlbK7lhZhnN4bn:y1lWnlxK7RhnGb
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{bfb6cb33-d795-45a3-83f9-e6d7f4190124}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BFB6CB33-D795-45A3-83F9-E6D7F4190124}.tmp
Size 1.0KB
Processes 2540 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis