Dropped Files | ZeroBOX
Name 3ac574cabd5086b3_~$ccc.dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$ccc.dot
Size 162.0B
Processes 2236 (WINWORD.EXE)
Type data
MD5 a9e6361c3259a6a86ba04bf9d15a177b
SHA1 e7089f79854799e504f9fe86255fc918113b7200
SHA256 3ac574cabd5086b3e6824bef9c2927a49423285d64ce53d3c20742cb56200f01
CRC32 AFB51B65
ssdeep 3:yW2lWRdvL7YMlbK7lZ0nNWXnkf:y1lWnlxK73Vnk
Yara None matched
VirusTotal Search for analysis
Name e13ea576198b05ed_~wrs{f16ac57e-561d-4c12-89c0-e3aaec389c46}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F16AC57E-561D-4C12-89C0-E3AAEC389C46}.tmp
Size 8.0KB
Processes 2236 (WINWORD.EXE)
Type data
MD5 1ca7aa2791800c49445c7bd3d1b1d27d
SHA1 db347656a1d945e9fa4256a3b5a7f7d18beb463a
SHA256 e13ea576198b05ed88c6b9220ce295d6d7e2d9018f1ade70280d1f557100f308
CRC32 F0897C19
ssdeep 192:+zHDFVjJplsQXcjqvbKZx45bD/hmLEoHFpcmtHj:KJlswcWuZx45brQAALv
Yara None matched
VirusTotal Search for analysis
Name b94d63d5a5bc4597_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2236 (WINWORD.EXE)
Type data
MD5 065071323ed6d1b6ea7980dc7d9d3f76
SHA1 600804b6debf471838f8a42c707fc73213bde375
SHA256 b94d63d5a5bc4597066cbc7843e863afbd601e75cde946ae5a59fe84b628ff95
CRC32 89F0E588
ssdeep 3:yW2lWRdvL7YMlbK7l:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{cdd192d3-0b12-4393-966b-e1ae4a03c10e}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CDD192D3-0B12-4393-966B-E1AE4A03C10E}.tmp
Size 1.0KB
Processes 2236 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis