Dropped Files | ZeroBOX
Name bf1678b9c4ca2830_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1932 (WINWORD.EXE)
Type data
MD5 73288c8f7e78fb0de249ec8a5dcd1696
SHA1 b584ff3f890897e5e47398368d31958aeba7ee00
SHA256 bf1678b9c4ca2830863dfc35644957208611146f37a16e400f9b9ed39e3a53bf
CRC32 074530C7
ssdeep 3:yW2lWRd7/tdW6L7g/zJK7zb/aItYtnhl/l:y1lWPWm+K75YR/l
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{be4cdf0e-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDF0E-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 1932 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 3965052ae1f69d72_~$mlevenbrowser.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$MLEVENbrowser.dOC
Size 162.0B
Processes 1932 (WINWORD.EXE)
Type data
MD5 7e8fe58b7ef57dc16ee1e34408b3fad9
SHA1 ed60aa33015898184843e25d5c8886b6fe8f2a97
SHA256 3965052ae1f69d72365731156ea306eb79264d9eeaf18e8284d9277458e16d2f
CRC32 C09ED4D8
ssdeep 3:yW2lWRd7/tdW6L7g/zJK7zb/aItYtxzlll:y1lWPWm+K75YH/l
Yara None matched
VirusTotal Search for analysis
Name ebe1fb22041db159_~wrs{b6a424cd-5825-4470-9fad-b9a3d194b318}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6A424CD-5825-4470-9FAD-B9A3D194B318}.tmp
Size 12.0KB
Processes 1932 (WINWORD.EXE)
Type data
MD5 ae45d9f7879a2f3bea14f1b4949a8856
SHA1 1fa908edf54e9d7d1ae6f03d76a0c1d7602e6864
SHA256 ebe1fb22041db1595b2253e5507133bb209228bb66b618024f01bf72ee6f7d96
CRC32 FA342273
ssdeep 384:TBCcqIQj4D1Xu0yhEx8sadDfzKb2GUkNHpIPz:TAc/l1XkExfadzzKb/fNHyz
Yara None matched
VirusTotal Search for analysis