Dropped Files | ZeroBOX
Name dfce7b14b0afd691_~$cdivinezx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$cdivinezx.doc
Size 162.0B
Processes 296 (WINWORD.EXE)
Type data
MD5 b32563af8f40efd7cb85e7a6f6780796
SHA1 f6bee5300a104f7ac7f04d03880260dbf8f52070
SHA256 dfce7b14b0afd6919b97aaa4e555b290ebe176f3db7af054f1d03857a92748d6
CRC32 E5AEAA27
ssdeep 3:yW2lWRdvl3/W6L72l1XK7rTllpgFItk/3ZFLt:y1lW7l3/WmynXK7XllpgWkfN
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{31d356fb-5cdc-4ae5-9630-1138e3515487}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31D356FB-5CDC-4AE5-9630-1138E3515487}.tmp
Size 1.0KB
Processes 296 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 5145486d10c69aa2_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 296 (WINWORD.EXE)
Type data
MD5 6d53cd553dcf0555c03e2d5f010f3838
SHA1 0a673eafe227d9418f8589437869707bc1d03f8a
SHA256 5145486d10c69aa275aedffaf1a2edd9c4d5feeaeefa5828cf9a6eaa1e793ddc
CRC32 65117C6E
ssdeep 3:yW2lWRdvl3/W6L72l1XK7rTllpgFItk/3ZlT:y1lW7l3/WmynXK7XllpgWkfX
Yara None matched
VirusTotal Search for analysis
Name 515563a8df36865e_~wrs{f5717022-493d-4d0e-a626-6902a736dd8c}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F5717022-493D-4D0E-A626-6902A736DD8C}.tmp
Size 36.5KB
Processes 296 (WINWORD.EXE)
Type data
MD5 48c47d98c6a6d6daca959eef827339ac
SHA1 8240a934a08593cfd8df9c7df4d0bf852023db26
SHA256 515563a8df36865e4817baa87cd822275d4595fff1df057f3c0a93c4cda01241
CRC32 B4639F44
ssdeep 768:bs0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsf/6wnUYGA34Z:LDvwxKrK2fCBAE
Yara None matched
VirusTotal Search for analysis