Dropped Files | ZeroBOX
Name f849e81c2866377f_~$test2.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$test2.doc
Size 162.0B
Processes 808 (WINWORD.EXE)
Type data
MD5 721baa0c7c68897788c70691a665026c
SHA1 7e74be92b796876176e4e7240279cd83464242f5
SHA256 f849e81c2866377f8cb81c89fa6b37a4e768f5521d5693c2c6f1a9b4a3b265dc
CRC32 85F1A95D
ssdeep 3:yW2lWRdw/lwoW6L7/K7RekItbEW/iBieF/n:y1lWkWoWm7K7CQB9F/n
Yara None matched
VirusTotal Search for analysis
Name f2d6fcbb58b8254f_~wrs{74520b24-0841-4ca4-82b2-39bb2e72f1ec}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{74520B24-0841-4CA4-82B2-39BB2E72F1EC}.tmp
Size 1.5KB
Processes 808 (WINWORD.EXE)
Type data
MD5 4946760b77024afe61c428aa033aea6b
SHA1 ff79de06fa7bebcab6bf02afc4ce12623e93dd0b
SHA256 f2d6fcbb58b8254fc07af49bc68cf8bcd2996ce9b515ed23a999f27571da3dac
CRC32 44196AE1
ssdeep 6:IiiiiiiiiiI4/9+Qc8++lPkalT4Mu8lPloBl/tn:W49+QG+3/sn
Yara None matched
VirusTotal Search for analysis
Name d80a1b762d316f61_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 808 (WINWORD.EXE)
Type data
MD5 e4cae077b7d2040dd66a04ed8b95fff8
SHA1 8b82a1549da943dc3923af385ffc80a39e7f00d7
SHA256 d80a1b762d316f613ac809670230fb3023260779141da33ac03c049068da123f
CRC32 ED63212C
ssdeep 3:yW2lWRdw/lwoW6L7/K7RekItbEW/iB3mtl:y1lWkWoWm7K7CQB3mX
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{31d35785-5cdc-4ae5-9630-1138e3515487}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31D35785-5CDC-4AE5-9630-1138E3515487}.tmp
Size 1.0KB
Processes 808 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis